Computer Studies Revision Book Mukalele Rogers
Computer Studies Revision Book Mukalele Rogers
UCE
COMPUTER STUDIES REVISION
QUESTIONS AND ANSWERS
FOR UGANDA
COMPILED BY
Mukalele Rogers (0776960740)
www.mukalele.net
MARKETED BY
Mpeirwe Nobles (0753797809)
1
ABOUT THIS BOOK
2
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
TABLE OF CONTENTS
About this Book.............................................................................................................................2
Table of Contents .........................................................................................................................3
Computer Studies Syllabus Outline ..............................................................................................4
2016 UNEB Circular to all Schools Offering Computer Studies 840 ..........................................10
Past Paper Questions and Answers ...........................................................................................13
Final Paper 2000 ........................................................................................................................13
Final Paper 2002 ........................................................................................................................27
Final Paper 2003 ........................................................................................................................44
Final Paper 2004 ........................................................................................................................56
Final Paper 2005 ........................................................................................................................65
Final Paper 2006 .......................................................................................................................77
Final Paper 2007 ........................................................................................................................97
Final Paper 2009 ......................................................................................................................111
Final Paper 2010 ......................................................................................................................123
Final Paper 2011 ......................................................................................................................133
Premock 2011...........................................................................................................................141
Resourceful Mock 2011 ............................................................................................................158
JJEB 2011 ................................................................................................................................167
Final Paper 2013 ......................................................................................................................174
External Mock 2014 ..................................................................................................................182
Wakissha 2014 .........................................................................................................................192
External Mock 2015 ..................................................................................................................196
For Teachers: Sample UCE Exam Blue Print (UNEB 2015) and Blooms Taxonomy ...............211
What is Bloom’s Taxonomy? .............................................................................211
Blue Print and Question Paper UNEB 2015 ......................................................212
Question Paper UNEB 2015 ..............................................................................215
Final Paper 2016 ......................................................................................................................222
ACIETEKA 2017 .......................................................................................................................232
JJEB MOCK 2017.....................................................................................................................242
Final Paper 2017 ......................................................................................................................256
Examiners Report 2017 ............................................................................................................264
Final Paper 2018 ......................................................................................................................274
Extra Objectives Compilation One ............................................................................................286
Extra Objectives Compilation Two ............................................................................................301
3
COMPUTER STUDIES SYLLABUS OUTLINE
4
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
TOPIC 7: COMPUTER 7.1 Introduction to Computer Communication
COMMUNICATION AND 7.2 Computer Networks
NETWORKING
8.1 Introduction to Spreadsheets
TERM 2 TOPIC 8: SPREADSHEETS 8.2 Spreadsheets
3.1 Introduction to Web Design
TERM 3 TOPIC 9: WEB DESIGNING 3.2 Web Design
10.1 Introduction to Databases
S4 TERM 1 TOPIC 10: DATABASES 10.2 Database Design
TERM 2 TOPIC 11: ELEMENTARY 11.1 Introduction to Programming
COMPUTER 11.2 Developing a Simple Program
PROGRAMMING
TERM 2 – 3 TOPIC 12: TRENDS IN 12.1 Computer Integrity and Security
COMPUTING 12.2 Computer Ethics
12.3 Computers and Society
12.4 Emerging Technologies
12.5 Systems Analysis
12.6 Computer Professions
Categories of computers:
- Focus should be on the operations and examples of the categories.
Classification of computers:
- Endeavour to provide more information on other classifications not mentioned here in the
syllabus
Computer system:
- Focus should be on distinguishing hardware, software, data and communication components.
Components of computer hardware:
- When teaching storage devices, it is important to note and discuss Primary & Secondary
storage components.
System software:
- Focus should be on general functions of systems software
- Observe that system software is not an Operating system.
- Students should practice on functions of system software.
Application software:
- You should not limit to only Office packages but others like Desktop Publishing, Imaging
programs e.t.c.
- A clear distinction of types of application software is expected.
- Focus on types of application software should be on Off-shelf, Custom-tailored, Shareware,
Freeware and Open-source.
- Emphasis should be placed on demonstrations
Word processing:
- Focus is on document production with emphasis on skills outlined in the syllabus
- Much more practice should be done with related documents
- Creativity and maximum use of available features is encouraged at this level
- Tasks to students should be time-bound
Presentations:
- Where options are provided, all the commands / tools should be used.
- The “School advert” and “short stories” are progressive activities that will generate / develop
skills over a number of slides.
- The “School advert” should be handled / taught from scratch (black slides); templates and
wizards should not be used at this stage.
- Using skills gained out of practice in the school advert and short stories, learners should
be made to explore through the themes provided and make presentations in classroom / lab.
- You should encourage students to practice and gain skills in:
a. Mail merge
b. Hyperlinks
c. Inter links
d. Mathematical features
e. Document security
f. Import and export options.
System configuration:
- You should make use of the technical and user manuals provided with the computers and
software respectively.
6
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
- Consult / Research more from the Internet
- A lot of hands-on practice should be given to students
- At least two (2) computers should be put aside for practice
- Extra periods have been allocated to system configuration and another 2 for
Troubleshooting for purposes of providing students with more hands-on practice time in the
classroom.
Computer networks:
- You should limit configuration to dynamic IP addressing when setting up the SOHO Network
- You should cover as many terminologies as possible under computer communication.
- Internet will be treated on one of the types of Networks and the following should also be
emphasized:
History of Internet
Uses of the Internet
Types of Internet connection
- You should demonstrate Internet use and endeavor to make students practice in the use of
the Internet.
Spread Sheets:
- Start off with a simple mark sheet and progressively move towards an advanced worksheet.
- Limit the learning scope to the following:
Functions: Operations:
SUM ( ) , AVG ( ) , COUNT ( ) , MIN ( )
MAX ( ) , IF ( ) , Cell referencing ,
+ ; - ; * ; / ; ;()
Absolute (Fixed) , MODE , MEDIAN ,
7
COMPUTER STUDIES SYLLABUS OUTLINE
8
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
This mode of assessment shall be the core of assessment from senior one to senior four and
thus no time for assessment or examining shall be put aside for this subject in the said period.
It therefore means that all school terms with the exception of Senior Four - Term 2, shall carry
continuous assessment marks.
SUMMATIVE ASSESSMENT:
This shall be conducted at the end of four years of the ordinary level of education; in the same
way as has been the practice over the years. The same examination formats that have been
in existence shall still be maintained. Computer Studies shall be examined in two major papers,
with Paper 1 covering theoretical and applied sections of the syllabus and Paper 2 covering
the hands -on aspects of the syllabus.
PAPER I (2½ hours): This shall be a theory and practical theory paper with three sections.
Section A (20 Marks)
Will consist of 20 multiple choice questions drawn from the whole syllabus
Section B (60 Marks)
Will consist of 6 structured questions drawn from the whole syllabus
Section C (20 Marks)
Will consist of three (3) equally weighted practical theory questions and a candidate will attempt
only one (1) question carrying 20 marks; questions will be drawn from the following topics:
i. Elementary Programming
ii. Trends in Computing
iii. Systems Start-up and Configuration
iv. Computer Communication and Networking
v. Computer Hardware
PAPER II (2½ hours): This will be a practical paper with two sections.
Section A (40 Marks)
This section shall be compulsory and questions will be drawn from Word Processing and
Spreadsheets
Section B (60 Marks)
This section will consist of three (3) equally weighted questions of which a candidate will attempt
two (2) questions, each carrying 30 marks. The questions will be drawn from Databases, Web
Design and Computer Presentations.
9
2016 UNEB CIRCULAR TO ALL SCHOOLS OFFERING COMPUTER STUDIES 840
10
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
11
2016 UNEB CIRCULAR TO ALL SCHOOLS OFFERING COMPUTER STUDIES 840
12
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
13
FINAL PAPER 2000
17
FINAL PAPER 2000
19
FINAL PAPER 2000
4 Date/time
5 Currency
6 Auto number
7 Logical data types
(Yes/No, True/False)
8 OLE object
9 Hyperlink
10 Lookup Wizard
(b) Outline the function of each of the data types listed in (a) above
1. Text, which may hold letters, numbers or special characters
2.Memo type, which contain text of any type or length
3.Number type, which may hold numbers only
4.Date/time, which may hold month, day and year information
5.Currency type, which may hold dollar and cents amounts
6.Boolean type, which may hold values that are either true or false
7.OLE object- OLE (Object Linking and Embedding) objects, graphics or other binary data.
Field capacity is up to a gigabyte (GB) or limited by space available disk space
8.Lookup Wizard- when the value that you need exists in any table or from a list of static
values, you use the lookup wizard to help you establish a link to the table or to define the
combo box that display the list of values on a form or report
9.Validation is the process of comparing the data entered with a set of predefined rules or
values to check if the data is acceptable. Manipulation of data in a database included
(c) Differentiate between a field and an attribute, give an example of each
Field is a unit of data yet on attribute is a group of field or column in table.
Examples
Field
A field is a unit of data consisting of one or more characters. An example of a field is your name
address. Or your social security number.
Attribute. In a relation database, a table is called relation (not to be confused with a
relationship) A row is called a tuple (which rhymes with couple) and A column is called an
attribute .Some relationship DBMS these terms : Others use file (For tuple) and field (for
attribute )
(d) Outline the importance of a primary key in a database
A primary key used to ensure that there are no duplicate fields in a table
It avoids redundancy in tables since it can be represented as a foreign key in other tables.
26. (a) What is meant by the following terms:
(i) HTML – hypertext mark-up language is a language (text codes). Is a format in which web
pages are created.
(ii) Website is an electronic page that has links with other pages and contains information,
data etc.
(b) State three advantages of web publishing
Easy accesses to information.
Electronic commerce(E- commerce)
20
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
(c) Describe how a web page is a source of information
It is a source of information in terms of research of getting information on the internet.
Education,(on in connectivity)
Advertisement
Entertainment
(d) What is the difference between WWW and web page?
The internet is a worldwide connection of networks linked together. It is the largest wide area
network (WAN) in the world.
The World Wide Web is only one of the most popular service available on the internet.
The World Wide Web (WWW) also called the web consists of worldwide collection of electronic
documents.
Each of these documents on the web is called a web page.
Web page is a file of information stored on a web server
Website is an electronic page that has links with other pages and contains information, data
etc.
WWW is a web server in which or where information of a particular organization or company or
subject is stored.
SECTION C: (20 MARKS)
Answer only one question in this section.
27. You are given an assignment to create, design and present a polio awareness
presentation. How do you carry out the above?
Introduction - Define presentation software.
Name the presentation software being employed. (i.e. Power Point).
Body;
1 Mention how one gets to a new slide
2 Set a design out lay of the slide 1.
3 Describe how you, the topic section to be handle
4 In (Check on the creativity) slide 1.
5 (Elaborating on)
6 Arrange format and (preferably a paragraph). Editing, Graphics.
7 Mention how one inserts a second slide.
8 Follow the guideline as laid out in section A
9 Follow till slide.
10 Mention the looping and transition of slide and the timing.
11 Presentation it to the public with the use of a projector, a computer and screen.
28. “Computers have changed today’s ways of life”. Discuss
Definition of computer
(Positive effects))
1 Accuracy and rating, editing, and manipulating
2 Improved communication facilities (e-mail virtual education institutions of texts) reliability
3 Recreation (entertainment industry)
4 Employment opportunities have increased.
21
FINAL PAPER 2000
5 Large data storage and analysis and easy retrieval. (Improved file management).
6 More information
7 Stronger and more reliable defence systems have been built.
(Defence of security.)
8. Improve research work.
9. Information of industry(less production costs hence less costs of products to consumers)
10. Ease in trading across continent. (Trading on a P.C)
(Negative effects)
1 Less of sight due to over
2 Unemployment.
3 to ill material (moral degradation)Users have been exposed
4 Loss of information due to break down of systems.
5 High rate of forgery.
6 Expensive involved – maintenance.
29. “Computers are required both as a tool and as an occupation”. Discuss
Issues resulting from use of computers.
Today, there are a number of issues which have risen as a result of use of computer
as a tool. These issues include entertainment and breakthroughs in field like
health care education, communication, research, commerce, arts, transport,
automated production employment, and other various cultural effects health
issues.
Breaking-though
Due to development in information and technology there are lots of discoveries
Which have made in almost all sphere of human life in health care, education
Communication, research, commerce, arts, entertainment and transport.
(i) Science
In our professional live, a computer is an integral too in performance
of many jobs. The computer application is science has over years taken
much emphasis among the computer itself is scientific in nature, and so are all
Its functions.
Scientist has used computers in manufacture of different tools, equipments.
They have also used computers in verifying scientific things, theories and laws.
In science, computers have been used manufacture of heavy machines like plane,
automobiles, etc.
(i) Health care
There has been tremendous improvement in health care in the recent past due to
development in information and communication technology .there numbers of
breakthroughs which have been made; they include improved surgery and heart
surgery.
Crowns can also be made by a computerized methods that eliminates the need of
Impressions and plaster models, this methods is called computer-aided design and
Computer –aided manufacturing (CAD/CAM). The dentist uses an optical probe
system to record electronic images of the tooth. This information is entered into a
22
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
computer, which designs an electronic model of the tooth. The design is then
transferred though the computer to lead of a cutting tool. Which prepares the
crown to extract fit the tooth.
(iii) Communication
Many people use personal computers of computer terminal to contact other
Computers to communicate over other telephone lines requires advice called and
Special communications software. A modern translates incoming telephones
Network can use, and it translates incoming telephone signals into computer
Signals, special modems can connect portable computers with the cellular network
Once equipped, a computer can use the telephone network to contact
Computerized information services. called on-line services. This breakthrough
has facilitated the flow of information greatly. Some on-line service offer undated
news bulletins, shopping service and games. Others feature issues of newspapers
magazines and other research materials. A subscriber to o bulletin board system
(BBC) electronically “posts” messages and announcements, making them
available to all other subscribe. Another on-line services electronic (e-mail),
though which individual users communication with each other.
(iv) Research
In medical research, tiny computer will control mechanical device that replace
Organs that have ceased to function. It is believe that computerized nervous
System will assist paraplegics to with again.
In agriculture, researchers use computer to determine to fertilization program that
optimize yields of various crops.
Computers have become the most vital tools in commerce
(V) Computer networks
Enable people in business to send and receive electronic data with little regard
for time or distance. Today many business us electronic data exchange methods
that alternates and standardizes translation between retailers and suppliers
to conduct business translations electronically, transferring information such
orders and invoices between one computer and other. Another area that has a
wide usage of computer is telecommuting. The technique allows workers to work
at home and use computers communicate with an office computer.
(vi) Entertainment
Computers are playing a very important role in entertainment A
Musical instrument digital interface (MIDI) exists to link a musical instrumental
Sounds.
The background music in many movies, televisions, shows, and commercial is
electronically generated.
(vii) Transport
With rapid development information and communication technology, computers
have found their way in transport. today computers have found their way in
transport today computers are used in air, road and water transport. In all terminals
23
FINAL PAPER 2000
transport, entry pertaining entries and departures and even personal information are
recorded. In many countries transport are recorded and even personal information
are also recorded .In many countries transport system has been computerized and
has facilitated efficiency in the sector.
viii) (Automated Production)
It involve computerizations of production because in factories. In other words,
It is computer-aided production which does not require high manpower.
Advantages
1 It reduces the cost of production because of the efficiency of machines
2 It reduces fewer employers and this reduces the production costs.
3 It leads to improved quality of services and better range of products.
4 It indirectly helping jobs creation since it improves overall production and profits
5 Has helped in reduction of accidents in sectors like mining and chemical production where
much work is potentially hazardous
Disadvantages
In the short run, it leads to job displacement
Effects on employment
Evolution in information and communication technology has had its effect in
Employment though job creation, job replacement and job displacement
Job creation
Thousands of jobs have created in ICT sector especially in the production of Vital electronic
components that are the building block of computer. These components include the
microchip, resistors and transistors.
Once the computer has been built a variety of personal are needed to get them to do some
useful work. System analysts are required to do analysis and design of systems which will run
computers. Programmers are needed to implement the design computers. Data entry
operators are needed to prepare data through verification and validation for computer
processing .Technicians are required for maintenance and repair of hardware. Data
processing managers are needed to ensure the smooth running of the systems and trainers
to train users on computer and their opportunities in the society today.
Job replacement.
Computerization brings about elimination of jobs in most cases these jobs are replaced with
those that have greater responsibilities requiring high level training.
Job replacement therefore is a situation where by certain disappears in an organisation but
reappears in another requiring more and high skilled man power. For example, cleric staff in
an organisation filling forms in departments is now called data entry because they now use
mobile phones and email facilities send and receive mails. These jobs are still in existence
but required accounting program to do all the jobs
Job replacement is the process of replacing man power with computerized machines, either
their own or with the help of a free skilled and highly trained people. In most cases, the
eliminated jobs are those involving monotonous and un skilled labour. For instance factory
jobs can be displaced by machines called robots.
However on a negative note: computers affect the people who use them physically,
24
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
economically and socially.
Computers as an occupation include the following Career opportunities in information and
communication technology.
Description of career opportunities in the field of ICT.
Information and communication technology [ICT] has created new jobs titles such as
computer operators, computer technicians, system analysts, computer programmers ,
software engineers, computer engineers, information system manager, data base
administrator, computer trainers, website administrators, computer graphics, designers
and network administrators. This section explains some responsibilities of these
professionals who are generally called information technology workers and these include
the following4
1 Computer operators,
2 Computer technicians,
3 System analysts,
4 Computer programmers,
5 Software engineers,
6 Computer engineers,
7 Information systems manager,
8 Data base administration,
9 Computer trainer,
10 Website administrators,
11 Computer graphics designers
12 Network-administrators.
This section explains some responsibilities of these professionals who are generally
called Information technology workers.
Computer operators.
Some of the responsibilities of a computer operator include
(i) Entering data into the computer for processing.
(ii) Keeping up-to-data records (log files) of all information process activities
Computer technician
Given that computers require regular maintenance, upgrade as well as emergency repairs,
demand for computer technician continues to grow as more and more computerize their work
place and homes.
Some of the responsibilities of a computer technician are:
i. Troubleshooting computer hardware and software related problems
ii. Assembling and upgrading computers and their components
iii. Ensuring that all computer related accessories such as printers , modems, storage media
and devices are in good working condition
iv. In developed countries, technicians help hardware engineers designing and creating some
computer components such as storage devices, motherboards etc
Systems analyst
This is a person who is responsible for analysing a company’s needs or problems then designs
25
FINAL PAPER 2000
and develops a computer batch information system. A good system analyst is one who has
the following attributes.
i. Good problem solving skills and creativity i.e. must have the experience in solving
problems
ii. Good communication skills: the analyst must be able to communicate clearly and precisely
both in writing and in a speech
iii. He/ she must be able to talk to different groups of people e.g. managers, operators,
attendant and general public.
iv. Must have business knowledge. The analyst must be well trained in relevant areas of
computer science such as hardware, software and programming knowledge.
Some of the responsibilities of a system of a system analyst include
Reviewing the current manual or redundant information system and making recommendations
on how to replace it with a more efficient one
Working with programmers to construct and test the system co-coordinating training for users of
the new system
Computer programmer
Large organisations such as insurance companies, banks, manufacturing firms and government
agencies hire programmers to work together with system analyst in order to write in-house
application programs or system programs.
Customise commercial application package to suit the organisation needs.
Test, debug, install and maintain programs developed or customised for the organisation.
Software engineer
A software engineer is one who is skilled in software development and technical operation of
computer hardware.
Some of the responsibilities of the software engineers are:
1 Developing system and application software
2 Developing user and technical documentations for the new software.
3 Maintaining and updating the software to meet day to day requirements while overcoming
challenges.
Computer engineer
Computer and electronic engineers are coming up with and more efficient technologies in
information and communication technology almost daily. Since computers are electronic
devices, hardware designers must be good in electronic engineering in order to be able to:
(i) Design and develop computer components such as storage devices, mother boards and
other electronic components
(ii) Determine the electronic power requirement of each computer component.
(iii) Re-engineer computer components to enhance its functionality efficiency.
(iv) Design and develop engineering and manufacturing computer controlled devices such as
robots.
Information system manager
The information system manager controls, plans, staffs, schedules and monitors all the
activities of the ICT department in the organisation. Using computerised management
information system (MIS), the manager can test the impact that an alternative cause action
26
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
might have on the business.
Other responsibilities of an information system manager include:
(i) Making sure that all tasks in the IT department are done correctly and on time in order to
support business planning, and control decision making processes.
(ii) Preparing budgets for the department.
(iii) Keeping the department inventory records up-to-date.
(iv)Managing the human resource within the department.
Database administrator
The major purpose of computerising organisations or institutions is to store data in an organised
way for easy access, retrieve and update. The organisation requires a person who should be
responsible for updating records in an information system database.
For this reason, database administrator is responsible for:
(i) Designing and developing database applications for the organisation.
(ii) Setting up security measures needed to control access to data and information.
(iii) Keeping the database up-to-date by adding new records, modifying or deleting
unnecessary records.
Computer trainer
Due to dynamic nature of computers and information technology, there is a high demand for
qualified ICT trainers. Some the responsibilities of an ICT trainer are:
(i) Training people on how to use a computer and various applications programs.
(ii) Developing training reference materials.
(iii) Guide learners on how to acquire knowledge through carrying out research.
(iv) Advising the learners on the best career opportunities in the broad field of ICT.
(v) Preparing learners for ICT examinations.
Web administrator/Webmaster
Internet is one the areas of information and communication technology that has drawn the
interest of most people. These people are able to exchange messages, search for information
and business through the internet.
Business organisations, educational institutions and individuals put information on the internet
by developing websites. Most organisations hire the services on a web developer who is
given the role of the company’s web administrator also referred to as webmaster. A web
administrator is responsible for:
(i) Developing and testing websites.
(ii) Maintaining, updating and modifying information on the websites to new demands by the
use.
(iii) Monitoring the access and use of internet connection by enforcing security measures.
(iv) Downloading information needed by an organisation or institution from internet websites.
END
27
FINAL PAPER 2002
1. Which of these best characterizes the mechanical era (1623-1945) of computer evolution?
A. Napier`s bones.
B. Programming languages.
C. Leibniz calculator.
D. Multics
2. A person who accesses computer systems illegally is referred to as:
A. Criminal.
B. Pirate.
C. Hacker.
D. Wizard.
3. Which of these best describes categories of computer system?
A. Analog and Digital computers
B. Micro and Analog computers
C. Windows and DOS
D. Digital and main frame computers
4. The following are possible with a computer except:
A. Speed and versatility.
B. Documentation and report making
C. Scheduling.
D. Thinking.
5. ………. Is the permanent type of memory found in computer systems.
A. RAM.
B. ROM.
C. CPU.
D. ALU
6. How many bits are found in the word INPUT?
A.5
B.35
C. 40
D. 56
7. Which of the following is a system software?
A. Spreadsheet
B. BASIC
C. Linux
D. Microsoft ward
8. The following are storage media except
A. Printer
B. CD-ROM
C. Tapes
D. Diskettes
9. Which of the following is an application soft ware
A. Windows
B. Computer games
28
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
C. COBOL
D. DOS
10. In word processing the feature where a word which does not fit on a line
A. Carriage return
B. entering
C. Scrolling
D. Word wrap.
11………. Is the intersection of a row and column in spread sheet:
A. A pointer
B. An address
C. A cell
D. A record
12. ………… is an address that does not change when a form copied to another location in
spread sheet.
A. Absolute address
B. Relative address
C. Mixed address
D. Formula address
13. A computer service that enables users to and receive messages is called:
A. Internet
B. WWW
C. Browsing
D. e-mail
14. A net work that connects computers in the same building is called.
A. BUS
B. LAN
C. WAN
D. MAN
15. …………. Is best for creating, storing and retrieving large volume of related
Information.
A. A Microsoft word
B. A Data base
C. An e-mail
D. A word file
16. Identify one of the following that is an odd operation of data base:
A. Creating slides
B. Creating a data base file structure
C. Defining fields
D. Calculating statistics for group of records
17. The following are done using presentation software except:
A. Creating an organisation chart
B. Creating graphic objects
29
FINAL PAPER 2002
C. Creating a query
D. Adding video clips
18. Identify one these that represents an application of presentation soft ware:
A. Displays e-mail messages
B. Desktop publishing
C. Printing and addressing a set of letters.
D. A visual aid to enhance communication
19. The following best describes the purpose of a web page.
A. Making money on the internet
B. Creating awareness about some thing on the internet
C. Uploading files on the internet
D. Downloading files on the internet
20. Which of these is likely to happen in future about internet?
. A. Very expensive
B. Faster connections
C. Fewer users
D. Extensive use of wires
SECTION B :( 60 MARKS)
21. (a). What is meant by the computer generation?
Computer generation is the technological advancement which has been classified
into four generation.
30
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
(b). State five differences between first and fourth generation of computers
First generation Fourth generation
Vacuum tubes for Internal operation Large scale and very large scale
Integration for internal
Operations
Magnetic drums for primary SDRAM chips for primary
Memory Memory
Limited primary memory Pentium iv have minimum of
128MB of memory
Heat and maintenance problems Four generation computers have internal fans to
Punched cards for input and cool the CPU and send out the warm air .and
Output input and output is done
Law input processing speed and Fourth generation computers have high speeds
reliality of processing ranging from 2.0 MHZ to 3.0
MHZ.
Increase use of high-level languages A variety of high level programming languages
and OOP languages
First generation Fourth generation
Programming system Fourth generation computers
Need no special language for
Each processor
No operating system Fourth generation computers
Have a variety of operating systems (windows.
Linux .UNIX etc)
(c). (i) Define, digital computer?
Digital computers are so classified because they process data that is presented in form of
discrete values (discrete values are numbers that can be defined like 1,2,3 etc)
(ii) Give two main differences between digital and analogy computers.
Digital computers Analogy computers
1 Not continuous(discrete) Pulse Continuous voltage
2 Can only have one of two voltage levels Can have one voltage
3 Voltage jumps between levels Wavy” voltage as time
progresses
(d). (i) What is computer hardware?
- Hard ware comprises of the physical electronic and electro mechanical
parts of the computer
-These are the tangible components of a computer.
(ii). List five examples of hardware devices.
1. In put hard ware(keyboard, mouse)
2. Storage hard ware (CPU)
31
FINAL PAPER 2002
3. Storage hard ware (primary-RAM, secondary storage hard disk, floppy diskettes, compact
diskettes)
4. out put hard ware(printer, plotters screens)
5. Communication hard ware(modems, cables, fax modem etc)
22. (a) Write DOS in full.
Disk operating system
(b). State four differences between DOS and Windows.
DOS - command line interface Windows - Graphical user interface
Operation is fast because Graphical user interface needs or requires
commands can be entered more memory as well as a faster
directly through the keyboard. processor.
Many commands can be grouped It is difficult to automate functions for experts’
together as a batch file so that user.
repetitive tasks can be automated.
Commands have to be learnt. Graphical user interface is user friendly
because it is easy to learn and work with.
Commands have to be memorized. Commands need not be memorized because
the commands are represented in icons and
pictures.
(c). Define an Application software.
Application software refers to programmes that perform specific tasks for users.
Most application software is available as packed software that can be purchased in retail
stories or on the web
(ii).Give any two distinctions between word processing and Desk top publishing.
Word processing software, also known as a word processor, is used to create, edit, format,
save, and print documents that contain text and graphics.
Text editors are simple word processors and are generally used to type without ant special
formatting. However the advantage is that the document can be saved, retrieved, and
modified at all. Text editors are mainly used to write small notes, memos and programs.
Desktop publishing (DTP) software is used to design and produce complicated documents
that contain text, graphics and brilliant colours.
DTP software is ideal for the production of high-quality colour documents such as newsletters,
catalogues, textbooks, and annual reports. Popular DTP software includes MS Publisher,
adobe page maker, adobe in design, quark press and Broderbund print shop pro.
Desktop publishing software combines word processing and graphics to produce high-quality
documents with a laser printer. Components of a desktop publishing system-these include
powerful microcomputers, graphics display, mouse, laser printers, scanners and desktop
publishing software such as PageMaker, Microsoft publisher, print shop pro etc
Advantages of DTP
1 DPT software is specifically designed to support page layout which is the process of
arranging text and graphics in a document on a page by page basis
2 DPT software includes colour libraries to ensure that colours will print exactly as specified.
32
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
3 DPT software supports colours separation for producing the master copies used in the
final press work.
(d). State four uses of a word processor.
1 Letters
2 Memos
3 Reports
4 Mailing reports
23.(a) What is the meaning of the terms?
(i). Work sheet
A work sheet is one sheet in a spreadsheet workbook. Each worksheet consists of 256 columns
and 65536 rows. (For Ms Excel)
(i). Active cell.
A c ell is the intersection of a row and a column. Each cell has an address that consists of the
column letter and row number (A1, B3, C5 and so on)
An active cell is where the pointer is situated in a particular moment.
The spreadsheet below shows sales of a second hand cloth store in a given week.
Answer questions (b) to (d) on the spreadsheet.
Numb A B C D E F
er
1 SECOND HAND-CLOTH STORE
2 Day Debt Units sold Costs price Selling Profit
($) price ($)
($)
3 Monday Shirts 46 16.50 20.00 3.50
4 Tuesday Shirts 60 18.70 30.00 12.00
5 Wednesday Shirts 36 11.40 16.60
6 Thursday Shirts 21.30 26.60 5.13
7 Friday Shirts 60 19.25 21.90 2.65
8 Totals 300 87-15 115-63 29.43
9 Average 60 17-43 23-13 5-90
(a) State the entry for cells E7 21.9
(b) What is the formula used to calculate the:
(i) Totals for:
- Units sold =SUM (C3:C7)
-Selling price (sales) =SUM (E3:E7)
-Profits =SUM (F3:F7)
Average for:
-Units sold =AVERAGE (C3:C7)
-Cost price =AVERAGE (D3:D7)
(d) Find entries:
(i) F5 =F8-(F7+F6+F4+F3)
OR =SUM (F3:F7)-(F6+F5+F3+F2)
33
FINAL PAPER 2002
(ii) C6 =C8-(C7+C5+C4+C3)
OR =SUM (C3:C7)-(C7+C5+C4+C3)
(e) State two examples of spreadsheet programs are:
-Microsoft Excel
-Lotus 1-2-3
-Quattro pro
-Super calc
24. (a). Define the following terms;
(i). Internet
Internet is a worldwide collection of networks combined together.
(ii) Intranet.
It is a small version of the internet used with an organization, (It’s a LAN which covers a small
geographical area for example a university or a hospital.)
Intranet uses TCP/IP protocols, supports multimedia web pages, and is accessible via a web
browser.
Intranet generally makes company information accessible to employees and facilitates working
in groups
(b). Give two differences between the intranet and internet
The internet is a worldwide collection of networks linked together while the Intranet is a small
version of the internet used with organizations.
(c). Explain the following internet items:
(i) TCP - Transmission control protocol
FTP (File transfer protocol) is an internet standard that allows users to upload and download
files with other computes.
An FTP server is a computer that allows users to upload and download files using FTP.
An FTP site is a collection of files that reside on an FTP server.
IRC– Internet Replay Chatting
A chat room is a location on an internet server that permits users to chat with each other by
typing lines of text on the computer.
Some chat rooms support voice chats and video chats.
To start a chat session, a user must connect to the chat server through a chat client program on
his or her computer.
Most web browsers also include a chat client
(d) State three factors affecting computer communication over the internet.
Transfer rate is the speed of transmitting data and information.
Transfer rates are usually expressed in bits per second (bps), kilobits per second (kbps), or
megabits per second (mbps).
The transfer rate of a transmission medium depends on its bandwidth and speed.
Network topology- since data travels in both direction in a network, if data collides, then it has
to be sent again and the network down. On the other hand, star networks have collisions and
usually run faster.
Capacity of hardware - hubs, switches and network internet cards have their own maximum
speeds
34
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
The server - amount of RAM and speed of the hard disk
Location of software and files – storing software on workstation hard disks reduce network
traffic and speed performance.
(e) Mention four requirements needed to connect to the Internet.
An ISP to supply the internet
A PC (computer with a network card)
Network operating system (an operating system)
A browser ( internet explorer or Netscape navigator)
Communication media ( physical cables – e.g. twisted pair, coaxial cable or wireless
communication e.g. wireless antenna, micro wave, infra red)
Technical know to configure the internet flow in your computer.
25.(a) Explain the meaning of the following data base terns:
(i) Forms
Forms provide alternatives to tables of data entry and view records. With forms, you arrange
the fields as required on the screen – you design your form to look like the printed form
(invoices, order forms etc.) that you use.
(ii) Query
Querying which is to use a specific set of rules (i.e. criteria) for retrieving data from the
database.
Queries are used to locate specific records within the table or ask questions to your database.
You might want to extract records that meet specific selection criteria (e.g. all employees who
earn above a certain amount of salary in the accounts department) when you run a query, the
results are arranged in columns and rows like table
(b) Differentiae between,
(i) A field and a record in a data base
A field is a column in a table that contains a specific piece of information within a record (is a
piece of information in a record)
A record is a row in a table that contains information about a given person, product or event (an
individual entry in a table)
(ii) Give an example of each.
-field FIRST NAME
-record PATRICK
(c) How would you do the following using a word processor?
(i) Put space between sentences. SPACE BAR
(ii) Put a title/heading in the middle of a line. CENTRE
(iii) Make changes to a document. EDIT
(iv) Get a hard copy of a document: PRINT
(c) State three differences between floppy and compact disks.
Floppy diskette CD
1 Storage capacity 1.44 MB Storage capacity 700MB
2 Access speed is slow compared to CD Access speed is faster compared to floppy
disks
35
FINAL PAPER 2002
Minimize the number of visitors to your computer installation and do not allow any one to your
server except the network administrator
Avoid diskettes coming from different installations as your system might contract viruses
If you have unwanted printouts, please destroy them because data is not supposed to fall in
unauthorised hands
Save data regularly as an abrupt power cut off may corrupt your data, if you have no UPS.
SECTION C :( 20 MARKS)
Attempt any one question from this section.
27. What are the advantages and disadvantages of Internet in business today?
Amazon is an example of a company doing all its business over the internet, selling books,
music, videos and more. Log on by typing in the address www.amazon.co.uk and you will see
a screen showing the Amazon website.
Once you have purchased anything from Amazon, they use this information to suggest other
purchases that you might like, or, as on the website. Also offer you the chance to sell the
products back once you have finished with them.
Advantages to business
For a business such as Amazon, this way of doing business has numerous advantages:
- There is a huge saving on overheads: no costly warehouse space, rent, hearting or
employment facilities.
- The ‘virtual shop’ can stock every one of the 16,000 or so CDs produced in the year (a one
stop centre for all the music) whereas a conventional store would stock only between 5 –
10,000.
- The shop has arrangements for ‘Just In Time’ delivery from its suppliers, so does left with
books and CDs which it cannot sell.
- It is a valuable market research tool – a list of customers’ names and address, purchases,
likes, dislikes and suggestion can be built up at absolutely no cost and used to improve the
service provided.
Advantages to customers
There are advantages to the customers, too. They can:
- Visit the shop without having to leave home, at any hour of the day.
- Hear snatches of a song before dancing to buy.
- Shop without being jostled by crowds, having to listen to music that is not to their taste.
Amazon estimates that the proportion of visitors to offer site which make purchase is much
higher than for those who respond to direct mail shot. Many of their customers return to make
further purchases.
A company which operates like this in Uganda is True African.com which also deals in selling
Ugandan music online.
The drawbacks of online commerce (Disadvantages of using internet for business)
Inevitably, there are drawbacks to buying goods online.
- For one thing, there worries about giving a credit card number over the internet. It is possible
that hackers could retrieve thousands of credit card number and use them to order goods.
- Secondly, when companies post up information about new products and services, it is not
their customers who will visit the site – competitors will also be regular visitors, indulging in a
38
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
little industrial espionage to make sure that they do not left behind.
- Thirdly, because internet sites can be accessed from all over the world, companies have to
be aware of the laws regarding data protection in every country. Different countries have
different laws regarding the holding and passing on of personal information about individuals.
Several companies have experienced problems with people who have set up websites using
their own company’s trademark. They then demand large sums of money for web address, or
collect card numbers from unsuspecting visitors to the site.
Computers have also brought negative impacts on society, which include:
- Moral degradation – one finds that the youth spend most of the time glued on the internet
watching moral degradation pictures, movies and more.
- Amongst the friends they find on the net some have acquired morals like lesbians, cults,
hackers and others.
- Computers have also affected our sights. A bigger percentage of people who have been
working with computers for years are now putting on glasses to support their sight and
computers emit rays and heat which is not environmentally friendly to the surrounding and
may be hazardous to human.
- Computers also consume power although now modern computers consume less power.
- Internet is good for communication but in case of a virus it can spread to millions of
computers just in seconds.
- Hackers who usually work in groups can easily access and corrupt data records. Therefore
computer owners must protect their computer systems, probably with some sort of passwords
or a ‘fire wall’ which to a layman is not easy because this is beyond their understanding.
- Hire rate of forgery. People use high quality printers to try and fake money notes and
passports.
- In case of the systems breakdown a lot of information may be lost which might be very
disastrous to the organisation.
Other advantages of using internet include:
Business - to – business
- One of the major growth areas on the internet is trading between business – for example
distribution and delivery of manufactured goods. International carries can make huge savings
by taking orders over the internet, and customers cannot only make savings but also get
online information about exactly what their goods are, and when they are delivered.
Finding new suppliers
- The internet is increasingly being used by business to find suppliers of goods and services.
Japan Airlines, for example has used the internet to post orders for in-flight materials (as
plastic cups must carry) in order to solicit business from firm that comes across its site, rather
than the usual Japan suppliers.
Other interesting topics on the net include the following.
Virtual learning
- Virtual learning via the internet and e-mail are the latest address to a category called distance
learning which has been dominated with correspondence classes through traditional post
mail. Instead of packing briefcase and rushing off to school or college, students are logging
39
FINAL PAPER 2002
41
FINAL PAPER 2002
- Internet can help you to land your first job or your next job. If you are a boss, then you can
utilize sites designed especially to help you look for the perfect employee for your
organisation. Also available are jobs and numerous job listing.
Newsgroups
- Newsgroups or electronic discussion groups allow people to discuss or exchange information
on a vast array of topics. Discussion groups arrange from social issues to scientific and
research. An article may appear like a single newsgroup, or it may be cross-posted to many
newsgroups.
Finding people and Organisation
- One of the first things folks do when they get on the internet is to find relatives, friends and
colleagues. Unfortunately, it is also one of the hardest things to do since there is no central
directory of everyone with network account. Many people change jobs or internet service
provinces frequently and that makes it even more difficult to track them down.
- Various search engines and the white and the yellow pages are good start points for
searching for e-mail addresses. Yahoo search engines have a facility: Yahoo people search
that searches for telephone, e-mail homepage addresses. Online white and yellow pages can
be accessed by Big yellow (an info seek partner) that searches for both white and yellow
page information.
42
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
useful information using the Internet. 10. It helps in businesses, factories, offices, schools and
homes.
Disadvantages
1. It destroys your social life and interactions with humans if you do not maintain the balance.
2. It may effect to the destruction of your eye sight due to radiation.
3. It may cause pimples and wrinkles.
4. It may damage your studies and life.
5. Too much time in front of monitor may adverse effect your eye sight and can also make
you fat.
6. The way it distracts and can deviate our thoughts and activities towards unproductive
activities.
7. It could cause violation of privacy, impact on labor force, health risks, impact on
environment, distraction from work, and possible antisocial influences.
8. Getting away from their real life and getting into bad lines
29. (a) What is a computer virus?
(b) Explain how computer viruses are spread?
Software antivirus guards include the following
One popular anti virus program is Norton antivirus, others F-secure, MAC fee anti virus, Dr.
Solomon, AVG, Penicillin anti virus, Kaspersky, internet security etc.
An anti virus utility scans for programs that attempt to modify the boot program, the operating
system and other programs that are normally read from but not modified.
Anti virus utilises normally look for virus signatures to identify a virus. A virus signature or virus
definition is known as specific pattern of virus code. Users of anti-virus utilities must update
the virus definition files as often as possible to ensure that such files contain patterns for
newly discovered viruses.
However, a polymorphic virus modifies its program code each time and attaches itself to
another program or file, so that even an anti-virus utilities can not detect itt by its virus
signature.
Anti virus utilities may also detect viruses by inoculating existing program files. To inoculate a
program file, the anti virus utility records its file size and file creation date in a separate
inoculation file and uses this information to detect if a virus has altered the inoculated
program file.
However, a stealth virus infects a program file, but still reports the size and creation date of the
original, uninfected program. If an anti virus utility can not remove the virus, it often
quarantines the infected file in a separate area of a hard disk until the virus can be removed.
Most anti virus utilities can create recovery disk to remove or repartee infected programs and
files (e.g. boot sector virus).In extreme cases, a hard disk may need to be reformatted to
remove a virus
Back up is a duplicate of a file, program or disk that can be used if the final is lost, damaged or
destroyed. It can be restored by copying the backed up files to their original formation on the
computer. Back up copies should be kept in a fire proof and heat proof safe or site.
END
43
FINAL PAPER 2003
45
FINAL PAPER 2003
Pascal
BASIC
COBOL
Java
FORTRAN
C+
C++
Small talk
23. (a) Identify three precautions a web designer should consider when designing a
web page
Precious contents
Use minimal graphics
Consumer requirements
Copyright consideration
Avoid use of frames
(ii)Why is it not good to have a lot of graphics on a web page?
It may take too long to load
Client computer may support different colour depth.
Takes a lot of space
(b) List four qualities of a good Web page
Should load quickly.
Should have feed backs.
Should have web page title and a brief summary about the page.
Should have links (references) to other resources.
Should have date of last up date
Should have good navigation buttons
(c) List four qualities of good web page
1.It is more resistant to external interfaces e.g. noise
2.It transmits more data supports large band width
3.The signal is not attenuation (i.e. signal strength remains constant)
4.Faster data transmission
24(a) what is an application package?
(i) Application package is user software program designed to accomplish a given task
(ii) What is a custom package?
Custom made package an application program designed to meet a clients particular needs
(iii) Distinguish between custom made and off-application packages
Custom made program are developed to meet particular needs for ends user’s
where as Off-shelves are of general nature and solve needs which are common in nature e.g.
Word processing, spreadsheet etc
(iv)State three advantages of off- shelf package
Readily available
48
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
They can be customized
Have less error
Cheep
(c) (i)What is word processing?
It is a process where text is manipulated to form document, reports
(ii) List three word processing application packages.
Micro Soft Word
Word perfect
Word star
Lotus ami-pro
Word pad
(c) Give three advantages of optic fibre cable over UTP (unshielded twisted
pair).
Advantages of Fibre Optics
System Performance
Greatly increased bandwidth and capacity
Lower signal attenuation (loss)
Immunity to Electrical Noise
Immune to noise (electromagnetic interference [EMI] and radio-frequency interference [RFI]
No crosstalk
Lower bit error rates
Signal Security
Difficult to tap
Nonconductive (does not radiate signals) Electrical Isolation
No common ground required
Freedom from short circuit and sparks
Size and Weight
Reduced size and weight cables
Environmental Protection
Resistant to radiation and corrosion
Resistant to temperature variations
Improved ruggedness and flexibility
Less restrictive in harsh environments
Overall System Economy
Low per-channel cost
Lower installation cost
The disadvantages of structured UTP cabling:
Because there can be different kind signals wired to different outlets and all outlets look the
same, the user needs to be careful not to wire a device to an outlet where a wrong type of
signal is wired. Wring connection can lead to situation that the system does not work correctly
or even to equipment damages.
The application originally designed for some other type of cabling need usually special
49
FINAL PAPER 2003
50
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Penicillin
AVG
F-secure
Kaspersky
(ii) State three symptoms of viruses.
Computers may freeze
Computers may not start at all or boot
Computers may be rude or display irritating messages
Corrupted files
A computer may fail to solve or accessing a file to save
Failure to do print jobs
26(a) State four major characteristics of the third generation computers.
Integrated circuits or IC semi conductor devices with several transistors built into one
physical component.
Use parallel processing
Introduction of operating system o/s e.g. multics.
Introduction of simple programming languages e.g. BASIC
Low cost, high reliability, small in size.
Low power consumption and computers become more popular
Introduction of magnetic disk for storage purposes.
They were much cheaper than the first and second generation computers.
There was the introduction of remote processing. This allowed the user to remotely access
the computer using a terminal.
(b)What do you understand by the following terms
(i)Command line interface
With command line interface, a user types keyboard or press special keys on the keyboard to
enter data and instructions.
Provided with a virtually empty screen with a blinking cursor (prompt) where commands are
keyed in and the computer executes them on pressing the enter key.
(ii)Graphical user interface
A graphical user interface (GUI) allows a user to use menus and visual images such as icons,
buttons and other graphical objects to issue commands.
You are provided with a coloured screen with icons each representing a program. A mouse may
be used.
(iii)Mechanical computer
Computers composed of mainly movable parts i.e. wheels and axles
(iv) Electro mechanical computers
Computers that are electronic and have movable parts
(iv) Give two examples of operating systems with the following;
Command line interface
DOS
51
FINAL PAPER 2003
UNIX
LINUX
Graphical user interface
Windows
Susie Linux
Nowel Netware
Electro mechanical computers
Leibniz stepped reckoner
Analytical engine
SECTION C:(20 Marks)
Approach to section c questions
27. A world without computers is no world at all’. Discuss.
a) - Introduction
- Definition etc.
b) Body (positive)
Research
28. What merits and demerits of learning using internet over using textbook
learning?
Computer-based training, which include:
Computer –assisted instructions (CAL), so that teachers can use computers and
other IT equipment to present teaching materials in more interesting way
Computer –assisted learning (CAL), so that students can use computers and
appropriate software to learn at their own pace
Computer-assisted assessment (CAA), which may reduce the time and labour to
mark the answer scripts
Distance learning through computer-based training and web –based training
Simulations of experiments or real –life situations that may be hazardous
Electronic library system for searching borrowing, and returning books
The school Administration and management system (SAMKs) for keeping records of
students and producing report cards or other related documents.
Edutainment, which is a type of educational software that combines education with
entertainment
Advantages of using IT is learning and teaching include
CAI and CAL packages that usually contains multimedia effects make learning more
interesting and interactive
Students can learn by themselves when teacher is not available
Students can learn and proceed at their own pace
Students can usually get their results of feedback immediately after they have answered the
question or taken an action
There are rich educational resources on CD-ROMs and the internet.
Teachers can present subject matter and explain abstract concepts more clearly with multi
media.
52
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Teachers can show experiments that area difficult to perform or dangerous in nature through
simulations software.
Advanced instructions can be given to students in areas where the teacher may not be
qualified
Disadvantages of using IT in teaching and learning include
Face to face interaction between students and teachers may be reduced
Students can only follow what the CAL packages are predefined to offer
Initial investment cost of this project is not affordable by many schools
To run this kind of project there has to be power
Need for trained staff to run the project
It does not benefit the blind and the dump
It also benefits schools which have trained perfectly in English accent since the CD’s come in
American English etc.
29. Juma, a village boy exclaimed “Spreadsheet programmes are useless”. As a
student of computer studies, convince him otherwise.
Spreadsheet software is used to organise data in rows and columns and perform calculations
on the data.
Before the advert of computers, cash flows and budgets required for business planning had to
be done by hand. These days there is no excuse for not having good information
Using spreadsheets
Sales can be recorded, invoices produced and statements compiled
Management can keep track of the current payments from customers in relations to goods
dispatched
Regular printouts of aged debtors, that is people who have owed you money for money for
more than in the period allowed in your terms of business can be detected.
Researchers can compile and analyze their results
Teachers can easily create tables of figures and manipulate them quickly as required. The use
of spreadsheets in our normal life is numerous.
A spreadsheet document is often called a worksheet.
On each worksheet, data is organised vertically in columns and horizontally in rows.
Each column is identified by a letter (i.e. A, B, C…) and each row is identified by a number (i.e.
1, 2, 3 …)
A cell is the intersection of a column and a row
Each cell has a unique cell address (e.g. A1) to define its location on the worksheet
The upper-left most cell is generally identified as A1
Each workbook may contain worksheets, charts sheets, macro sheets and visual basic
programming modules. The number of worksheets you can create and store in a workbook is
limited only by the memory with the computer.
Common editing features include:
Creating a document involves entering text or numbers, inserting graphics, and performing
other tasks using an input device such as keyboard or a mouse.
Editing is the process of making changes to the existing content of the document
53
FINAL PAPER 2003
thousands of rows. This expensive area allows you to keep related information together and
to produce reports that are larger than a normal report.
Electronic spreadsheets can perform mathematical, statistical and financial calculations
quickly and accurately. The primary use of a spreadsheet is to calculate formulas such as 200
+ 350 that are entered into cells.
Cells in electronic spreadsheets can use information from other cells a formula may consist
solely of numbers or it may refer to other cells in the spreadsheet. Rather than entering the
values 200 + 350, a formula can reference the cells in a worksheet that contain these
numbers. With a manual worksheet changing a single number can mean hours of extra work
in recalculating figures. Changing produces a ripple effect of recalculations for all formulas
dependant upon the value.
Electronic spreadsheets can be stored and retrieved for repeated use. You can permanently
save electronic spreadsheet only diskettes, hard disks or other types of media for safe
storage. Rather than searching through endless filling cabinets for handwritten worksheets,
you can use your computer’s electronic filling system to retrieve files instantaneously. An
electronic spreadsheet can be retrieved, edited, updated, printed and then saved under a new
name quickly and easily.
57
FINAL PAPER 2004
C. Electronic mail
D. Browsing the net
14. A computer network refers to:
A. Information storage
B. Linking of computers for resource sharing
C. Connecting a computer system to a backup device
D. Sharing a computer by many people
15. In Database, a field is;
A. The way information is displayed
B. A particular listing with files
C. The entire collection of data
D. Each bit of information in a record
16. Database performs the following functions:
A. Storing of slide, retrieving and formatting
B. Formatting, organising and retrieving pictures
C. Creating, organising and managing collection of related data
D. Entering data, saving, retrieving and drawing graphs
17. URL stands for:
A. Uniform resource locator
B. Universal resource link
C. An e-mail
D. Web publishing software
18. Which of the following best distinguishes WAN from a LAN?
A. The number of computers connected
B. Distance between connected computers
C. Mode of computers connected
D. Type of operating system used in the net work
19. WWW refers to:
A. Web World Wide
B. World Words Web
C. Wild World Web
D. World Wide Web
20. A problem that is most likely to occur due to future advancement of computer is:
A. Under development
B. Under population
C. Unemployment
D. Insecurity
ANSWERS SECTION A
1. B 5. D 9. C 13. C 17. A
2. C 6. B 10. B 14. B 18. B
3. A 7. A 11. D 15. D 19. D
4. C 8. D 12. A 16. C 20. C
SECTION B: (60 marks)
58
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
21. (a)Write the following abbreviations in full
i) LSI - Large Scale Integration
ii) COBOL-Common Business Oriented Language
iii) BASIC-Beginners All Purpose Symbolic Instruction Code
b. Distinguish between Main frame and Mini computers
Mainframe computers are physically large compared to mini computer
c. Name two types of instruction that computers use to do their works
-control signals
-data signals
d. List down any components that are part of the system unit
i. Power supply
ii. motherboards
iii. CPU or processing chip
iv. RAM chips
v. Expansion slots
e.What is CD-ROM?
Compact Disk Read Only Memory is an optical disk format that is used to hold rerecorded text
graphs and sound (multimedia)
ii. Mention one advantage of CD-ROM over a hard disk
Disks cannot be written on or erased by the users
22. a). Mention any three safety security measures taken in a computer laboratory
i. Dust free cover computer ventilations
ii. Switch on…your computer hardware system starting from the wall socket
b. What is system software in a computer?
Is a set of programs software that manages the operation of the computer itself.
c. Name three examples of system software
i. Operating system
ii. Programming language
iii. System utility
d. Name any four functions of utility programmes
File view
File compression
Diagonalistic utility
Disk Defragmenter
Uninstaller
Antivirus utility
Screen saver
e). What do you understand by the following terms
Editing -Correcting mistakes, formatting, improving on appearance
Saving- Is the transfer of data information from memory to secondary storage
Troubleshooting- Is the correcting and rectifying errors, mistakes
23). a. What is a spread sheet?
59
FINAL PAPER 2004
Computer spreadsheet is the application package used for manipulating of figures. E.g.
MS Excel
Lotus 123
quarto pro
Super cal.
(b). Name any 4 functions of spreadsheet software.
(i) Data sorting, the ability to create, saves , edits, and retrieves worksheet.
(ii) Charting facility to draw graphs, data source.
(iii) Templates and built in function + formulae for adding.
(iii) Data formatting, summering, ability to perform” what if analysis.
c). List 3 data types of entries in spread sheets
(i) Labels
(ii) Values
(iii) Functions
(d). Mention 3 types of graphs created in spread sheet.
(i) Line graph
(ii) Pie chart
(iii). Bar graph
(ii) XY scatter
(iii) 3D Pie chart
(iv) 3D Bar chart
(v) Bubble chart
(vi) Area
(vii) Doughnut
(viii)Radar
(ix) Surface
(x) Stock
(xi) Cylinders
(xii) Cone
(xiii)Pyramid
(e). (i) What is computer virus?
Computers virus is a soft ware or program that infects the computer negatively without
the acknowledge of the owner.
(ii) Mention 2 ways which a computer can be affected by a virus
Use of infected diskette
Through e-mail/ internet
Use of infected hard disk
Through some down loads
Through freeware/shareware
24. (a) Write the words below in full
(i)FTP-File Transfer Protocol
(ii)WAN-Wide Area Network
60
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
(b). State any 3 factors that can affect communication speed on the internet
Transmission (frequency and bandwidth
Line configuration(point to point and multipoint)
Serial and parallel transmission (serial data transmission and parallel data transmission)
Direction of transmission flow (simplex, half duplex and full duplex)
Transmission mode (asynchronous verses synchronous)
Packet switching (getting more data on a network)
Protocols (the rules of data transmission)
Type of processor
c) Distinguish between the e-mail and the internet
Email systems allow to send, letters and files containing data of all type from your computer to
any other computer with e-mail address and a modem, simply by typing the recipients name
and pressing the send button. The internet is the largest wide area network in the world, in
fact it is not a single network of two types LAN and WAN
(d). What is a server?
A server is the host or central computer that manages the resources on
A File server stores and manages files
A print server manages printers and print jobs
A database server stores and provides access to a database
A network server (e.g. DNS) manages network traffic
(e). List any 2 functions of a server
A server provides a centralised storage area for programs data and information
A dedicated server is a server that performs a specific task
(f). Give 4 differences between a hard disc and a floppy disc
Hard disk Floppy disk
A hard disk (HD for short) Floppy disk (FD for short)
Holds more information Holds less information i.e. 1.44 MB
Less portable Portable
Access to its data is quick Access to its data is slow
25.(a). What is a data base?
A database is a collection of data organised in a way that allows ac access, retrieval,
and use of the data.
(b) Distinguish between Microsoft excel and data base
A database is a collection of data organised in a way that allows access, retrieval and use of
the data. Common paper (databases) include telephone books, dictionaries, recipe cards,
and television guides.
Computerised databases in Uganda include flight information phone inquiry system, and
database systems in the public libraries.
Microsoft Access is one of the popular database software. Database software includes:
Microsoft visual
Fox pro
61
FINAL PAPER 2004
Borland dbase
Lotus approach
Corel paradox
Claris file maker
Pro corporate based systems include
SQL
Sybase
Oracle
Informix ingress
progress
c) List 4 examples of data that can be used to create a data base
Database system in the public libraries
Computerised databases in Uganda include flight information, phone inquiry system
d) Mention 3 examples of data base management software
School management system (SMS)
Library system for keeping books
Inventory systems
Database for car number plates
Database for insurance companies
e) Give 4 advantages of electronic databases over manual databases
Reduction of data redundancy-storing most of data in one place means less duplication and
less required space.
Enhancement of data integrity- because data are centralised fewer updating errors occur and
greater accuracy can be maintained
Ensured data independence – data are entered, stored, modified and accessed by methods
that are not affected by application programs. Also changes made to data structures usually
do not require changes in programs that access the data base
Facilities of data sharing and integration- database systems offer users the ability to combine
or to cross reference data in many different ways.
Improvement of access to data – data systems allow users to query the database directly,
without necessarily using an application program
Centralization of security- it is easier to limit access to information if it is grouped together
instead of being kept in several scattered files. Many data bases must be protected and kept
private
Reduction of costs- data entry, data storage and the development of new application
programs are all made more economical. By eliminating the duplication of data, many
organisations can realize substantial savings.
26. a) Explain the following terms as used in presentation software.
i) Slide show
They display of slides in a sequence moving from one side to another
ii) Slide sorter
62
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
This is a display where slides appear in a miniature form so that they can easily re arrange
them/ or manipulate
iii) Slide layout
Refers to a single slide (format and design)
b) Explain the importance of presentations
Used for visual aid communication
Used for summarising content for presentation
Used for advertising
c) Describe one function of a slide master
A Slide Master allows you to create a presentation with different types of slides but enable
them to all have the same "look
e) Outline how you would create a transitional loop
Slide made
Slide show
Menu
Transition sub menu
Transition
Windows
Select timing
Select condition
Loop until escape key is pressed
SECTION C (20 MARKS)
27 “Computers have destroyed our culture” what are your arguments for and against
this Statement
Against
Destroyed crafts man-ship i.e. computers have taken over man’s ability to execute tasks
Working patterns i.e. change of work schedules
Erosion of traditional religious norms i.e. exposure to ant religious material
Erosion of traditional moral values, marriage values, sex values etc.
Use of electronic or computer based communication systems as opposed to the traditional
ways e.g. use of post office
The security of the internet is so relaxed and piracy of peoples work ( research) goes inches
iced
Exposure to illicit material has led to people’s adopting negative behaviour
For
Increased productivity through efficiency and effectiveness
Improved communication i.e. widened ways of communication (diversified)
Enhanced scientific research
Improved on the ways of doing business
Education has been boasted i.e. offering a new set of knowledge
Promoted inter relationships
63
FINAL PAPER 2004
64
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
may be able to change text size and background colour, blind people can use text-to- speech
conversion packages, people with arthritis or cerebral paisy may control the computer by
speaking to it instead of using the keyboard or mouse.
However there is a fear that IT technology will make teachers redundant and that path students
will lose skills of social interaction as they become more isolated in their own little cyber-
world. Computer aided learning packages have many advantages.
Disadvantages of using IT in teaching and learning include
Face to face interaction between students and teachers may be reduced
Students can only follow what the CAL packages are predefined to offer
Initial investment cost of this project is not affordable by many schools
To run this kind of project there has to be power
Need for trained staff to run the project
It does not benefit the blind and the dump
It also benefits schools which have trained perfectly in English accent since the CD’s come in
American English etc.
C.700 MHZ
D. 600 MHZ
6.……is a popular 7-bit encoding system
A. ASCII
B. EBCDIC
C. Hexadecimal
D. Binary
7.This component of the central processing unit (CPU) carries out all the logic and
mathematical operations
A. ALU
B. System clock
C. Registers
D. Control unit
8.…..is a group of commands available to the CPU which determines the basic computer
A. Instruction set
B. Operating system
C. ROM BIOS
D. Hard disk
9.Which of the following is not computer peripheral?
A. Monitor
B. Printer
C.CPU
D. Keyboard
10. A….. is not an example of an output device
A. Printer
B. Plotter
C. Monitor
D. Keyboard
11. Which one of the following is not a programming tool?
A. Debugger
B. An interpreter
C. Note pad
D. A compiler
12. Okello intends to draw up an inventory. Which of the following is the most suitable?
software to use?
A. Ms-dos
B.C+ +
C. Ms-excel
D. Pascal
13.A……..makes it easy to find your way round the internet
A.net browser
B. microsoft word
C. computer
66
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
D. a presentation
14. Slides as output are displayed using…..software.
A word processor
B an internet explorer
C. A spread sheet
D.A Presentation
15. Which of the following is not a storage device?
A disk drive A
B. disk drive B
C. Mother board
D.CD-ROM
16. The process of starting a computer is known as:
A. Surfing
B. Booting
C. Mother board
D. Clicking
17. T he output displayed on the screen is termed as:
A. Photocopy
B. Softcopy
C. Master-copy
D. Hard-copy
18. One of these is a pointing device used to manipulate on screen objects:
A. CD-ROM
B. Digital camera
C. Scanner
D. Mouse
19 Which of the following devices can be used to convert an image or text on paper documents
into electronic format that a computer can display, print and store
A. Track ball
B. Scanner
C. Monitor
D. CD-ROM
20. The option on the menu bar which enables one to name a document and store it on a
storage device using another name is?
A. Save
B. Save as
C. Edit
D. New
ANSWERS SECTION A: (20 Marks)
1. C 6.B 11.C 16.B
2. D 7.A 12.C 17.B
3. A 8.C 13.A 18.C
67
FINAL PAPER 2005
68
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
The control unit extracts the instructions from the main memory decodes them, and executes
them.
(ii) Control unit
Functions of the control unit.
Decodes instructions (is the process of translating the instructions into commands the computer
can execute)
Executes instructions (is the process of carrying out the commands)
(iii) Define a byte
A byte is eight digits grouped together. A byte is more informative than abit because it can
represent 28=25 different things.
(d) Distinguish between ROM and RAM
RAM ROM
Ram is volatile Rom is non volatile
Ram is read and write Rom is read only
Ram is temporally (not permanent) Rom is permanent
Ram can be increased Rom is normally not increasable
70
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
An antivirus utility is a programme that prevents, detects, and removes viruses from a
computer’s memory or storage device.
One popular antivirus programme is Norton Antivirus programmes include: AVG antivirus
software, f-secure, Kasperspy internet security, Dr.solomon, MacAfee antivirus
c. i) What do you understand by term screen saver as applied to computer?
Screen saver is utility that supposedly prevents monitor display screen from being etched by
an unchanging image(burn in)
A screen saver is utility that causes the monitor’s screen to display moving image or blank
screen of no keyboard or mouse activity occurs 4 a specified time period
(i) Applications of a screen server programme.
Screen savers originally were to presented a program called ghosting, in which images could
be permanently etched on a monitors screen
Screen savers may also be used 4 reasons of security Presents unwanted on lookers from
accessing in4mation or data from your computer
Business- advertisements on the screen
Entertainment-digital photos can be put on your screen as your pictures
Prints burn in
iii). State two precautions that should be taken when cleaning a screen display area.
Never use watery (wet cloth) to clean you screen
You always ask a technician 4 help
Never put your screen near magnetic media
d. State any two steps that must be followed to safely shut down a computer from the
Microsoft word file
Steps that must be taken to safely shut down a computer from micro soft word file
Click on file save as the document
Click on file close
Click on file exit
Click on start-up, shutdown (2 shutdown the computer)
25. (a) Define the following terms:
(i) Warm booting
Warm booting is the process of restarting computer that is powered on
A warm boot is the process of restarting or resetting computer that is already turned on.
The warm boot sometimes the computer stops working or responding 2 the commands given by
the user. In search cases we need not 2 switch computer off to restart the system. We can
restart the system by pressing (ALT+CTRL+DEL) keys together on some computers, RESET
switch is there, and the rest switch can be used to restart or reboot the system instead of
pressing CTRL + ALT+ DEL keys.
(iv) Monitor(display screen)
(v) Are output devices that show programming instructions and data as they are being input
and information after it is processed
(vi) Folder
Folder (called also in command line interface) is where files are kept and subfolders
71
FINAL PAPER 2005
73
FINAL PAPER 2005
6.If a school has a website, they can use the web mail service to send parents and other
stakeholders items such as newsletters, remainders etc.
7.A website increases ways of contact. Once you have a website you can list your website
address on your business cards, report cards, and even the school signpost.
8.Internet today is being used 24 / 7 and is accessible from every house. People are becoming
highly dependent on the internet. By having a web presence, the market of the school expands
your significantly.
9.A school website helps students and parents to make a wise academic choice after using the
vast quantities of information about a given college or university.
10. In conclusion, a well-designed website is just as important a public relations tool as school
catalogs and brochures. If a school has web presence, it can be listed in web search engines
and know worldwide. Today everything you need is achieved at the click of a button.
28. (a) Outline the different forms of secondary storage.
Diskettes
Hard discs
Flash memory
Optical tape
(b) Describe the characteristics of each of the above forms of secondary storage.
Diskettes (characteristic)
Typical floppy disk
A floppy disk in a thin, circular
Flexible plastic disk disc with a magnetic coating enclosed in a square shaped plastic shell.
If a computer has only one floppy disk drive, the drive is usually designed drive A (i.e. A:)
If the computer has two floppy disk drives, the second one is usually designed drive B(i.e.B)
The most widely used floppy today is 3.5 inches wide.
Before anything can be written on the new floppy it must be formatted.
Formatting is the process of preparing a floppy disk or hard disk for reading or writing by
organizing the disk into storage allocation called tracks and sectors.
For reading and writing process, sectors are grouped into clusters.
The formatting process may also erase the file location information and redefines the
allocation table for these items of a formatted disk.
Today most floppy disks are high-density floppy disk.
Floppy disk usually spins at about 350 revolutions per minute.
The average access time for current floppy disk drive to locate an item on the disk 84
milliseconds, or approximately 1/ 12 seconds.
To care for a floppy disk, it should not be exposed to heat, cold, magnetic fields, and
contaminants such as dust, smoke, or salt air.
2.) HARD DISK (characteristics)
A hard disk usually consists of several inflexible, circular called platter, on which items are
stored electronically.
A hard disk is also known as a hard drive.
74
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
The hard disk in most desktop and laptop computer is housed inside the system unity, and
considered fixed disk because being not portable.
Hard disks are sealed tightly to keep out of contaminants (e.g. dust and smoke particles),
which may result in head crash.
Hard disk undergo two formatting steps a low-level format and a high- level format.
Some computers are able to improve the hard disk access time by using caching.
The storage of data, instruction, and information to and from a hard disk is managed by a
special purpose chip and its associated electronic circuits called the hard disk controller
(HDC).
Some manufacturers develop a type of hard disk system, called RAID, which connects
several smaller disk into a single unit that acts like a single large hard disk.
3) A CD-ROM (compact disc read- only memory)
Because CDM-ROM and audio CD use the same laser technology, a CD- ROM drive can
also be used to play audio CDs.
A CD- ROM (compact disk read-only memory) is a compact disk that uses the same laser
technology, as audio CDs for recording music.
A CD- ROM, however, can continue text. Graphics video and sound.
The contacts of standard CD- ROMs are written or recorded, by the manufacture, and cannot
be modified by the user.
A CD ROM drives or CD –ROM player is required to read items on a CD- ROM.
A computer disc (CD) is a flat, round, portable, storage medium that is usually 475inchs in
diameter and less than one-twentieth of an inch thick.
29. Give your arguments in favour and against the impact of computers in our society
today.
Computers impacted many items in today's society.
Personal Impact
Privacy and personal rights
Data banks, computer terminals, data security
Employment
Job opportunities, new careers, the need for retraining
Business transactions
Automated billing, credit cards, consumer spending
The replacement of people through automation
Robots, word processing
The impact that a machine has on a human - ergonomics
Community Impact
Employment
Traffic control
Urban planning
Law enforcement
National Impact
75
FINAL PAPER 2005
Communications media
The use of information for control
Vote counting
Electronic funds transfer
Stock-market transactions
Defense
Surveillance
National data banks
Employment
Shifting patterns
Telecommunications
Satellite broadcasting
The possibility of fraud or theft using computer based systems
Standards for computer hardware and software
Global Impact
Reporting of current events
Communications media
World government
International standards
Exploration of space and sea
World wide access to data
Future Impact
Computers in the home
Gaming
Learning
Electronic mail shopping
Business transactions
Information processing, storage and retrieval
The home as a work center
Effect on the family unit and on familiar patterns of life travel
Computer communication as a replacement for travel
The possible disappearance of hard copy as a medium of communication
The cashless society
Possible effects on the formal education system
The use of robots in industry and in the home
Teleprocessing networks
Communications networks
76
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
79
FINAL PAPER 2006
iii) Avoid abrupt switching off and on of the computer system use the normal way of shutting or
closing down all the programs then shut down the computer from the start button.
iv) Place the microcomputer in a dust free environment with good ventilation. Dust covers
should be used to cover the microcomputer when not in use and if you are using polythene
covers then do not cover the computer immediately after switching off as it will trap heat
v) The microcomputer should not be exposed to direct sunlight
vi) Food or drinks should not be allowed near the computers
vii) The computers should be regularly serviced, at least once a year or more frequently if the
environment is dusty. The service should normally include blowing the dust from the system
unit, cleaning the floppy drives, keyboard, including all the keyboard contacts, also clean the
monitor regularly with a wet cloth. Make sure you do not drop water in the computer system. If
water drops in accidentally do not use the computer immediately until water has completely
evaporated
viii) Do not open the computer for inside cleaning, this should be handled by a qualified
personnel
ix) It is good practice to keep a record of the daily condition in case of computer failure
x) The peripheral devices, such as printers and mouse should be regularly serviced
xi) The floppy disks used for installation of programs and backups should be kept safely in disk
banks, and kept away from sun light and magnetic media.
xii) Floppy diskettes have to write protected all the time especially for installation
diskettes(using protection tabs) and remove the write protect when writing on the diskettes if
they are used for backup
xiii) In areas where the power fluctuates, it is important to use either a stabilizer or UPS to
ensure a steady input of power to the computer system
SOFTWARE
The vital part of a computer system is the data. In fact data is expected to a number of risks and
great care can be adopted to protect against them. The risks to data are:
i) Accidental loss
ii) Accidental damage or corruption
iii) Theft
iv) Deliberate damage or corruption
v) Authorized disclosure
To guard against these risks, the operator must make sure that:
a) Makes back up copies of the data regularly. Before backing up, make sure that the data is
error free otherwise you might take up a back copy of corrupted data
b) Minimize the number of visitors to your computer installations and do not allow ant one to
your server except the network administrator
c) Avoid diskettes coming from different installations as your system might contract viruses
d) If you have unwanted printouts, please destroy them because data is not supposed to fall in
unauthorized hands
e) Save data regularly as an abrupt power cut off may corrupt your data, if you have no UPS
FILE AND DISK MAINTAINANCE
80
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
i) To minimize data corruption, the file and disk maintenance should be performed regularly. A
lot of file deletion for instance causes file fragmentation that may lead to reduced access time
, file cross linking etc
ii) These are some of the operations to be performed for file and disk management.
iii) Have proper subdirectory structure and avoid keeping a lot of files in the root directory.
iv) Use CHKDSK command regularly to check on the lost clusters and convert them to files.
v) U se of utilities like optimizer (scan disk, defragmenter, pc –tools NDD, speed disk ) should
be utilized to remover fragmentation and system tools in windows operating system.
vi) A number of programs have written to enhance the use of personal computer utilities
b) Define the following terms as used in computer
i) Directory
Directory is a collection of files on given storage media/given drive
ii) Modem is a commutation device that converts between analog and digital signals
OR
Modem-device that converts signals from computer into telephone and vice versa to
enhance computer communication
c) Name any five peripheral devices of a computer
Keyboard Bar code reader magnetic ink character
mouse recognition reader
trackball Magnetic strips reader
touchpad Micro phone
joystick Voice recognition device
touch screen MIDI Device
light p en Digital Video camera
Stylus and graphics tablet PC camera
Digital camera Web cam
Optical character recognition reader Sensor and remote sensor
Optical mark recognition reader Terminal
scanner
Four common types of storage media are
Floppy disk
Hard disk
Compact disk
Tape
Zip drive
Other types of storage media include
MO disk
PC card
Smart card
Microfilm and microfiche
On line storage
81
FINAL PAPER 2006
82
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
iii) Track ball-input data/information pointing device
iv) Touch pad-input data /information device sensitive to pressure and motion
v) Joy stick-pointing device with vertical level for playing game ultrasounds scanners
vi) Touch screen- is a touch –sensitive display used for information kiosk located in
departments and ATM
vii) Light pen –pointing devices that can detect the presence of light
viii) Stylus and graphics table –is a pen like pointing device which uses pressure to write text
and draw lines
ix) Digital camera- takes pictures and stores the images digitally and cannot work separately
x) Scanner – capturing is a light input device that converts printed text and graphics into digital
form that can be further be processed by the computer
xi) Optical character recognition reader - these include a small optical scanner for reading
characters and sophisticated OCR software for analyzing what is read
xii) Optical mark recognition reader – used to sense handwritten marks such as small circles or
rectangles made on pre-printed forms in certain places
xiii) Bar code reader magnetic ink character recognition reader – can input (read) text printed
with magnetized ink
xiv) Magnetic strips reader – are used to input ( read) information contained in the magnetic
strips on card ( e.g. credit cards)
xv) Micro phone – is an input device that allows a user to speak to the computer
to enter data and instructions into the computer
xvi) Voice recognition device – is the computers capability to distinguish spoken words
xvii) MIDI device – is the electronic music industry’s standard that defines how
sounds are presented electronically by digital musical devices.
xviii) Digital video camera – records video a s digital signals rather than analog
signals
xix) PC camera – is a kind of DV camera that allows home user to record, edit and capture
video and still images and to make phone calls on the internet
xx) Web cam – is a video camera whose output displays on a web page
xxi) Sensor and remote sensor – is an input device that can detect external changes in an
environment
xxii) Terminal – is a device with a monitor and a keyboard
a)Explain the following terms as used in computer studies
i) System software
System software consists of programs that control the operations of the computer and its
devices
System software also serves as the interface between the user, the application software and
hardware
Underlying software that is used by the computer to manage its own internal activities and run
applications software
ii) Application software
Application software refers to programs that perform specific tasks for users.
83
FINAL PAPER 2006
Most application software is available as packaged software that can be purchased in retail
stores or on the Web
Software used to perform general purpose tasks e.g. word-processing, spreadsheet
iii) Utility programs
A utility program is a type of system software that performs a specific task, usually related to
managing a computer, its devices, or its programs
Programs used to support, enhance, or expand existing programs in a computer
b) Outline four functions of operating system software
Functions of an operating system include
Memory management
Spooling print job
Configuring devices
Monitoring system performance
Administering security
Managing storage media
File management
User interface
Booting
Managing tasks e. g. processing
c) List any 5 operating system that you know
Popular operating systems for microcomputers include;
Operating system
DOS Windows CE
Windows 3.x Palm OC
Windows 95 Pocket PC 2002
Windows NT workstation
Windows 98
Windows 2000 professional
Windows ME
Windows XP home
Windows XP profession
Mac Os
Os/2 Wrap
Novell net ware
Windows NT server
Windows 2000 server
Windows NET server
OS/2 wrap server for E- business
Unix
Linux
Solaris
84
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
85
FINAL PAPER 2006
86
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
d) What is a web browser? Give one example of a web browser
A web browser is a software program that allows a user to access and
view web pages
A web browser software program that acts as an interface between the
user and the WWW
It sends requests for information that is available on the internet and
displays the information for the user
Internet explorer
Netscape navigator
Mozilla
conqueror
(d) State four major components of an e-mail message
Subject/title
Address of recipient
Body
Sender’s name and address
Cc: carbon copy
Bcc: blind carbon copy
25. a) Define the following terms in relation to database.
i) File.
Is a collection of many records
A collection of related records
ii) Records
A record is a collection of related data items concerning a person
product, or event
A collection of related fields
A row in a database table
iii) Field
A field contains a specific piece of information within a record
A unit of data consisting of one or more characters
It is a column in a database table
b) Name three functions of databases
Data storage
Data manipulation
Data retrieval
Data sorting
Data summary
c) Outline four steps taken to create a simple database
Planning
Design layout
File structure creation
Defining the field
87
FINAL PAPER 2006
89
FINAL PAPER 2006
o Storage capacity
o A mount of RAM
o Network card (NIC)
o CD-ROM,DVD Combo
o Multimedia
o Type of Monitor
o Warrant
o Pre-=loaded software
o Other extras e.g. printer, cameras, UPS
o Computer skills handling
BENEFITS
Computerization of the school will bring the following advantages
Using computers for information processing (computerized information
systems)
Computers with communicating capacity can share data and information
with other computers
Tasks can be completed faster because computers work at amazing
speed
Computer can process large amounts of data and generating error free
results provided that the data is entered correctly
Computers can store enormous amounts of data for future use
The high reliability of components inside modern computers enable
computers to produce consistent results
Running cost become lower in the long term
Tasks can be completed with little human intervention
Overall security can be raised due to less human intervention
The management can observe new information and new trends more
quickly
Customer services can be improved due to more efficiently management
and operations
LAN will bring the following advantages:
Advantages of using a network
Facilitates communications because people can communicate efficiently
and easily via e-mail, instant messaging chartrooms, telephone, and
video conferencing.
Reduce costs by sharing hardware and software
Sharing data and information stored on other computers on the network
Allow tight control over who has access to what data.
If the school is connected to the internet the school will benefit from
the following:
People have different reasons for connecting to the internet, which
include the following:
90
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Access a wealth of information, such as news, weather reports and airline
schedules
Shop for goods and services
Use online banking services and manage investments
Do research and take online training courses
Download files, listen to music and watch movies
Send and receive messages to and from other connected users
Communicate with others around the world
Access sources of entertainment and leisure, such as online games,
magazines and vacation planning guides
Globalization
Education online
Enhance communication
Publication
Exchange knowledge
Advertising
28) Suggest reasons why there is an increase in the use of computers
in most
organizations in Uganda today
Introduction
An increase of computers in Uganda means that Uganda is in the right
direction because it is reducing the digital divides meaning that more ICT
devices per person or the of increase of ICT devices used by every
Ugandan is increasing. This has been bought about by the following
The government policy of introducing the ministry of ICT has boosted the
increase of computers in the country, because this is were the
technocrats who advice the government sit.
Taxes on imports of computers and computers related devices have
been reduced
Makerere university since 1995 has increased the rate of admission of
students doing computer related courses thus more Ugandans are
computer literates
Uganda being a liberals economy many institutions have come up with
computer related international courses and local courses thus more
students or people are now able to use computers
The computer business is booming in Uganda and the forces of
demand and supply are taking their course thus computers have
become cheap meaning that they are affordable
Government policy of introducing computer studies at O-level and
probably later in A- level has led to more Ugandans using computers
91
FINAL PAPER 2006
92
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
members is one of the recognizable efforts thanks to the government of
Uganda
29) “Total data security is not possible today”. Outline the areas
where this has been
achieved and challenged
Threats of data privacy
Theft of hardware
Theft of software; copying use of diskettes etc
Hackers
Crackers
Outside users
Employers
Ways of securing the system; to ensure privacy
Physical security against theft
Identification and access controls
Use of cards, keys signatures
Passwords, PINS
Encryptions
Audit controls
ESSAY
Data consists of raw facts and figures that are processed into information
Information is summarized data or otherwise manipulated (processed) data
Procedures are description of how things are done, steps for accomplishing
a result.
Cyber crime refers to online or internet based illegal acts. Some of the more
common computer security risks include:
Computer viruses
Unauthorized access and use of computer systems
Hardware theft and software theft
Information theft and information privacy
System failure
Threats of data privacy
Theft of hardware
Theft of software, copying, use of diskettes
Hackers
Crackers
Outside users
Employers
Viruses are often designed to affect or infect, a computer negatively by
altering the
93
FINAL PAPER 2006
94
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
e) Write protect the recovery disk before using it
f) Back up important files regularly
An anti virus utility is a program that prevents, detects and removes viruses
from computer’s memory or storage devices
A popular anti virus program is Norton Anti virus
Unauthorized access is the use of a computer or network without
permission
A cracker or hacker is someone who tries to access a computer or network
illegally.
Unauthorized use of a computer or its data for unapproved or possibly
illegal activities
Examples of unauthorized use of computers include
An employee using a company computer to send personal e-mail
Someone gaining access to a bank computer and performing an
unauthorized transfer
One way to prevent unauthorized access and unauthorized use of
computers is to utilize access controls
An access control is a security measure that defines
Who can access the computer
When the users can access the computer
What actions the users can take while accessing the computer
Access control is normally implemented using a two phase process:
Identification verifies whether the user is a valid one
Authentication verifies that the user is really the one he or she claims to
be
Four methods of identification and authentication exist, which include
User names and passwords
Possessed objects
Biometric devices
Call back system
User names and passwords
A password is a combination of characters associated with a user name
that allow a user to access a computer or a net work
A possessed object is any item that a user must carry to gain access to a
computer or computer facility
A personal object is any item that a user must carry to gain access to a
computer or computer facility
A personal identification number (PIN) is a numeric password, either
assigned by a company or selected by a user
A biometric device authenticates a person’s identity by verifying personal
characteristics e.g. finger prints
95
FINAL PAPER 2006
97
FINAL PAPER 2007
99
FINAL PAPER 2007
ANSWERS SECTION A
1.C 5.D 9.B 13. D 17. B
2.D 6.C 10. A 14. A 18. B
3.C 7.D 11. A 15. A 19. A
4.B 8.C 12. C 16. B 20. C
SECTION B (60 MARKS)
21. a) State any three advantages of dot matrix printers over jet
printers.
Advantages
They can withstand dusty environment, vibrations and extreme
temperatures
They can print on continuous paper or multi part documents
They are the only printers which can use stencils
They can print on a triplicate document because of the striking
mechanism
They are relatively cheaper compared to other printers
Disadvantages
They are generally noisy because of the striking mechanism
They give relatively poor quality print
They are not readily available on the market
They are not easily serviced because they are based on old technology
Their colour print is limited to two ( black and white)
b) Identify any three advantages of display devices such as monitors
over printers.
Advantages
They are generally quiet
No need of paper
Output can be modified or changed easily
Scrolling enables focus on a particular or part of document
Transmission to another device is faster e.g. on a LAN
The display devices are the user’s workplace, there making it easier to
use
The time taken to display the images is fast
Screen displays can include text, graphics and colours
c) (i)Distinguish between primary and secondary storage devices.
Primary storage refers to temporary storage of information the computer is
currently working on
OR
Primary storage can refer to basic storage when used to refer to RAM and
ROM
WHILE
100
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Secondary storage is permanently storage of information for future retrieval
or refers to backup storage facilities supplementing RAM
(ii) Give an example of each type of storage in c above.
Primary: RAM
Secondary: hard disk, floppy disk, CD ROM, flash disk, zip disk
(ii)Identify one disadvantages of a hard disk over a floppy disk.
Disadvantages
Hard disks are not portable ( except removable hard disks which are
usually more expensive)
Data becomes less secure if left on the hard disk
Head crash may occur due to extreme shock or contaminants
Since hard disks are metallic they expand and contract depending on
changes in temperatures this may cause data loss. This is one of the
factors that led to air conditioning of computer rooms
Disks may fail due to violet shaking (vibrations)
Disks are affected by magnetic fields since their storage media is made of
the same material
Hard disks are susceptical to virus attacks
d) State the device that should be acquired along with a computer to
help a user save work when electricity is switched off.
UPS (UNINTERRUPTED POWER SUPPLY)
22 a (i)What do you understand by terms below in reference to word
processing?
Formatting
Is making changes to the appearance of the document
Editing
Is making changes to an existing document
Saving
Is transferring of information / data in memory to secondary storage e.g.
floppy, hard disk, tapes etc
(ii)Give two advantages of hard copy over a softcopy
Advantages
It can not be easily changed without a computer
It can be read offline mainly without a computer
It is cheaper compared to softcopy which requires computer devices to be
able to read the information/ data
Hard copies last longer if stored in a safe place compared to soft copy
which must be all the time changed with the technological developments
taking place
Hard copies are universal as both the rich and poor readers read them
101
FINAL PAPER 2007
A B C D E F
1 July Aug Sept Total( Average (
$) )
2 Rent 72 72 106 250 83.33
3 Electricity 24 0 66 90 30.00
4 Telephone 96 00 114 300 100.00
5 Stationary 48 38 64 150 50.00
6 Total 240 200 350 790
102
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Electricity @ or = SUM(B3:D3) OR =B3 +C3 + D3
Telephone @ or = SUM(B4:D4) OR =B4 +C4 + D4
Stationary @ or = SUM(B5:D5) OR =B5 +C5 + D5
(ii)Averages for the months of July, August and September
Rent @ or = AVERAGE(B2:D2) OR = AVG (B2 +C2 + D2)
Electricity @ or = AVERAGE(B3:D3) OR =AVG( B3 +C3 + D3)
Telephone @ or = AVERAGE(B4:D4) OR =AVG (B4 +C4 + D4)
Stationary @ or = AVERAGE(B5:D5) OR =AVG (B5 +C5 + D5)
(b)It was error to enter (0) in cell C3. State the cells in which the
values would change automatically when the correct amount is put.
C6, E3, F3
C List the values in the rangeB3:D4 in the above table.
24, 0, 66
96, 90 and 114
(d) Shade on the worksheet above the cells that must be used to
create the pie chart below.
Telephone 40% Rent 30%
Stationary
20%
Electricity 10%
A B C D E F
1 July Aug Sept Total( Average (
$) )
2 Rent 72 72 106 250 83.33
3 Electricity 24 0 66 90 30.00
4 Telephone 96 00 114 300 100.00
5 Stationary 48 38 64 150 50.00
103
FINAL PAPER 2007
104
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
`replace', `find attributes'. In general, only the `access' method
needs to be specified for any URL scheme.
(C)What is an ISP in full in relation to Internet
Internet Service Provider
(iii) State the use of an ISP.
An Internet service provider (ISP) is a company that provides access to
the Internet.
(iv) State any three factors that should be considered in choosing an
ISP.
Price and billing;
Performance;
Help and installation;
Communication; and
Security of service
25.a Describe briefly the function of the following views as used in
presentation software.
(i) Outline view.
The Outline View shows the text of your presentation for easy editing
105
FINAL PAPER 2007
Transitions determine the effects applied when you move from one slide to
another during an on-screen presentation
Timing
Is the setting of PowerPoint presentation slides to advance at specified
intervals of time
26 a (i) What is a Data base Mgt system (D B M S)
A Database Management System (DBMS) is a. software package
designed to store and. manage databases
(ii) Give any three examples of (i) above.
My SQL
Postgre SQL
Microsoft Access
SQL Server
FileMaker
Oracle
RDBMS
Dbase
Clipper
FoxPro
(b Various DBMS use different data types, specify any five data types
used in DBMS.
Text
Memo
Number
Date/time
Currency
Auto number
Yes/No
OLE objects
Hyperlink
Lookup wizard
(C) State any five disadvantages of using Data base Mgt systems
instead of manual databases.
Advantages
Reduced data redundancy
Reduced updating errors and increased consistency
Greater data integrity and independence from applications programs
Improved data access to users through use of host and query
languages
Improved data security
106
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Reduced data entry, storage, and retrieval costs
Facilitated development of new applications program
Disadvantages
Database systems are complex, difficult, and time-consuming to design
Substantial hardware and software start-up costs
Damage to database affects virtually all applications programs
Extensive conversion costs in moving form a file-based system to a
database system
Initial training required for all programmers and users
SECTION C (20 MARKS)
27. Describe the various categories of computer application software
available today.
Application software, also known as an application or an "app", is
computer software designed to help the user to perform specific tasks.
Examples include;
1. Word processors.
2. Spread sheets
3. Data management soft ware.
4. Desk top publishing software.
5. Commutation software
6. Graphics soft ware.
7. Draw programs.
Integrated package: a suite of applications programs with their associated
data and documentation. Typically, it is usually much cheaper to buy an
integrated package than individual applications programs, it is easier to
copy data from one application in a suite to another (eg import a table of
data or a chart from a spreadsheet into a word-processing document) and
the user interface is similar for the programs in the suite.
Word-processor: allows you to create, edit, store and print a range of
different text documents; from letters and faxes to books and essays.
Spreadsheet: enables you to use formulas to perform a large number of
calculations on data stored in cells arranged in rows and columns. You
can investigate a mathematical problem, create a budget plan to forecast
how much you can save in a year or model the results of a science
experiment and draw a chart of your results.
Database management : uses forms to store data in tables made up of
records and fields. The data can be searched using queries in order to
find out useful information. It can be used to create anything from an
address book to a complex application that produces end of year reports.
107
FINAL PAPER 2007
108
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
The impact of data replication on job scheduling performance in the Data
Grid
Seamless live migration of virtual machines over the MAN/WAN
29. Describe the merits and demerits of using internet.
Advantages
Communication:
The foremost target of internet has always been the communication. And
internet has excelled beyond the expectations .Still; innovations are going
on to make it faster, more reliable. By the advent of computer’s Internet,
our earth has reduced and has attained the form of a global village.
Now we can communicate in a fraction of second with a person who is
sitting in the other part of the world. Today for better communication, we
can avail the facilities of e-mail; we can chat for hours with our loved
ones. There are plenty messenger services in offering. With help of such
services, it has become very easy to establish a kind of global friendship
where you can share your thoughts, can explore other cultures of different
ethnicity.
Information
Information is probably the biggest advantage internet is offering. The
Internet is a virtual treasure trove of information. Any kind of information
on any topic under the sun is available on the Internet. The search
engines like Google, yahoo is at your service on the Internet. You can
almost find any type of data on almost any kind of subject that you are
looking for. There is a huge amount of information available on the
internet for just about every subject known to man, ranging from
government law and services, trade fairs and conferences, market
information, new ideas and technical support, the list is end less.
Students and children are among the top users who surf the Internet for
research. Today, it is almost required that students should use the
Internet for research for the purpose of gathering resources. Teachers
have started giving assignments that require research on the Internet.
Almost every coming day, researches on medical issues become much
easier to locate. Numerous web sites available on the net are offering
loads of information for people to research diseases and talk to doctors
online at sites such as, America’s Doctor. During 1998 over 20 million
people reported going online to retrieve health information.
Access Information: The Internet is a virtual treasure trove of information.
Any kind of information on any topic under the sun is available on the
Internet. The ‘search engines’ on the Internet can help you to find data on
109
FINAL PAPER 2007
110
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
videos, movies, and a host of other entertainment software from the
Internet, most of which are free.
Disadvantages
Theft of Personal information
If you use the Internet, you may be facing grave danger as your personal
information such as name, address, credit card number etc. can be
accessed by other culprits to make your problems worse.
Spamming:
Spamming refers to sending unwanted e-mails in bulk, which provide no
purpose and needlessly obstruct the entire system. Such illegal activities
can be very frustrating for you, and so instead of just ignoring it, you
should make an effort to try and stop these activities so that using the
Internet can become that much safer.
Virus threat
Virus is nothing but a program which disrupts the normal functioning of
your computer systems. Computers attached to internet are more prone
to virus attacks and they can end up into crashing your whole hard disk,
causing you considerable headache.
Pornography:
This is perhaps the biggest threat related to your children’s healthy
mental life. A very serious issue concerning the Internet. There are
thousands of pornographic sites on the Internet that can be easily found
and can be a detrimental factor to letting children use the Internet.
Though, internet can also create havoc, destruction and its misuse can be
very fatal, the advantages of it outweigh its disadvantages.
1 A 6 D 11 D 16 D
2 C 7 B 12 B 17 A
3 B 8 D 13 A 18 A
4 A 9 C 14 A* 19 B
111
FINAL PAPER 2009
5 C 10 B 15 C 20 C
SECTION B:
21. (a) Describe the following terms below:
(i) Line spacing
Line spacing - refers to the vertical distance between lines of text. The
default line spacing is single spacing. This type accommodates the
characters in a text leaving a small extra space between lines.
Character spacing on the other hand refers to the space between the
characters in the text.
(02 marks)
(ii) Changing Case
Is when you type a text, there are a number of cases the user may intend to
apply in order to create contrast within the text. These are:
(1.) Sentence case: All the first characters in a sentence are in uppercase
(capitalized)
(2.) Lowercase: All characters appear in lowercase.
(3.) Uppercase: All characters appear in uppercase.
(4.) Title case: All the first characters of each word in a sentence appear in
uppercase.
(5.) Toggle case: It changes upper case to lowercases and vice versa,
(02 marks)
(b) Explain the following terms in presentation software:
Transitional looping – Is a facility which sets up the presentation to run
continuously until it is stopped by the presenter. Got through slide show –
setup show – then loop continuously until Esc. under show options. (02
marks)
Slide Master – This is a single slide that controls all other slides in a given
presentation. Any changes made to it affects the rest, respectively. (02
marks)
Slide Layout – This is the given design of a slide showing divisions/areas
or sections of a slide where work can be done. E.g. title only and blank
slide layouts. (02 marks)
22.(a) State any two functions of a central processing unit (CPU)
The central processing unit (CPU) is the electronic device that
interprets/decodes, and carries out the instructions that tell the computer
how to work.
Processing data
Fetching and sending of commands and instructions
Performs arithmetic and logic operations
112
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Temporary Storage/holding of data, instructions and results during
processing. ( 02 marks)
(b) Define the following memory storage terms:
(i) Bit
o Bit: In binary system, each 0 or 1 is called a bit, which is short for binary
digit. (I.e. a bit is the smallest unit of measurement of information).
(01 mark)
(ii) Byte
o Byte: A group of 8 bits is called a byte, and a byte represents one
character, digit, or unique shape, according to ABCDIC coding system.
(01 mark)
(c ) State two categories of computer memory giving an example in each
case:
Primary memory
Memory unit that stores the program that is being executed holds date data
that the program is using and storage of OS programs that manage the
computer.
(01 mark)
Examples;
RAM - Dynamic RAM, Rambus DRAM, Synchronous DRAM, Static RAM
Registers
ROM
(Any 01 x 01=01 mark)
Secondary memory
Relatively long-term and non-volatile storage outside the CPU and primary
storage.
(01 mark)
Examples;
HARD DISC
Floppy disks • CD-ROM
Magnetic tapes
Digital video disks
Etc.
(Any 01 x 01=01 mark)
(d) Describe the major difference between the two categories of computer
memory in (c).
Primary storage Secondary storage
1 Data can be processed 1 Data cannot be processed directly but
from directly from must be moved into main memory
storage
113
FINAL PAPER 2009
114
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
115
FINAL PAPER 2009
2 Second Transistor
3 Third Integrated circuits
4 Fourth Very large integrated circuits
(Any 04 x 1 = 04 marks)
25. (a) Explain the following terms:
(i) Off-the-shelf software:
Packaged software is commercial software, which is copyrighted and
designed to meet the needs of a wide variety of users. (01 mark).
Examples of off –the-shelf software:
MS-Office suite.
Computer games e.g. chess, cross word puzzle, etc.
Education software e.g. Encarta,
(Any 01 x 1 = 1mark)
Custom software is tailor-made software, which is developed at a user's
request to perform specific functions. (01 mark)
(iii) Example of Custom software:
Locally made school management systems(SMS), • Inventory
management systems.
Payroll management systems
Library management system
(Any 01 x 1 = 1mark)
(b) (i) What is a utility program?
Utility programs are part of system software used to support, enhance or
expand existing programs in a computer system and make it more and
more user friendly. (02 marks)
(ii) Functions of utility programs
Reduction and compression of files a through file compression utilities.
Compilation of technical information about a computer's hardware and
certain system software programs and then prepares a report outlining
any identified problems through diagnostic utilities.
A disk scanner is a utility that detects and corrects both physical and
logical problems on a hard disk or floppy disk, and searches for and
removes unwanted files.
A disk defragmenter is a utility that reorganizes the files and unused
space on a computer's hard disk so data can be accessed more quickly
and programs can run faster. When the contents of a file are scattered
across two or more noncontiguous sectors, the file is fragmented.
An uninstaller is a utility that removes an application, as well as any
associated entries in the system files
116
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
A backup utility allows a user to copy, or backup, selected files or the
entire hard disk onto another disk or tape.
Data recovery utility – recovers accidentally deleted files from your
computer.
An antivirus utility is a program that prevents, detects, and removes
viruses from a computer's memory or storage devices. One popular
antivirus program is Norton Antivirus.
A screen saver is a utility that causes the monitor's screen to display a
moving image or blank screen if no keyboard or mouse activity occurs for
a specified time period.
Screen savers originally were developed to prevent a problem called
ghosting, in which images could be permanently etched on a monitor's
screen.
Screen savers can also be used for reasons of security, business, or
entertainment.
(Any 04 x 1 = 04 marks)
26.(a) (i)Distinguish between Internet and World Wide Web.
The Internet is a worldwide collection of networks linked together.
The Internet is the largest wide area network in the world.
The World Wide Web (WWW), also called the Web, consists of a
worldwide collection of electronic documents.
Each of these documents on the Web is called a Web page.
(02 marks)
(ii) Mention any two services offered by the Internet.
People have different reasons for connecting to the Internet, which include:
Assess a wealth of information, such as news, weather reports, and airline
schedules.
Shop for goods and services.
Use online banking services and manage investments.
Do research and take online training courses.
Download files, listen to music, and watch movies.
Send and receive messages to and from other connected users.
Communicate with others around the world.
Access sources of entertainment and leisure, such as online games,
magazines, and vacation planning guides. (Any 02 x 1 = 2 marks)
(b) Define the following terms
(i) Band width
The width of the communications channel is called the bandwidth.
The higher the bandwidth, the more data and information the channel can
transmit.
117
FINAL PAPER 2009
118
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
These are a series of programs (instructions) that tell the computer what
and how to work.
(Any 01 x 1 mark)
Examples
System software –
Operating systems - Windows XP, Vista, Windows 95
Programming languages – C+, Java Script, SQL
Utilities – ANTIVIRUS software, disk defrag mentors, data recovery.
Application software;
Off the shelf (packed software) – MSOffice suite
Custom (tailor made) – school management system SMS
(Any 01 x 1 = 01 mark)
• These are a series of programs (instructions) that tell the computer what
and how to work.
System software manages the computer resources • Application software
solves the needs of the end user.
The made the computer more user friendly case for utilities
Production of other programs (programming)
(Any 02 x 1 = 02 marks)
Data consists of raw facts and figures that are processed into information.
Data consists consist of basic facts and figures that are processed into
information.
(Any 01 x 1 = 01 mark)
Data
letters (e.g., a, b, c, ...)
words and symbols
numbers
examination scores
musical notes
Names e.g. Moses
(Any 01 x 1 = 1 mark)
Data is the foundation for information.
( 02 marks)
Information is summarized data or otherwise manipulated (processed)
data.
Is manipulated/ processed data.
(01 mark)
119
FINAL PAPER 2009
Examples
Information
words (e.g., apple, boy, cat)
a report, a letter, an essay
a mathematical formula
comments, grades
A piece of music, a song
(Any 01 x 1 = 1 mark)
Importance
These are the basis of decision making.
Planning
Analysis
Forecast
Discovering the past, present and future.
(Any 02 x 1 = 02 marks)
User – the most important component of a computer system – used to
design and develop computer systems, operate the computer hardware,
create the software, and establish procedures for carrying out tasks.
Ordinary user - is someone without much technical knowledge of
computers but uses computers to produce information for professional or
personal tasks, enhance learning, or have fun.
A computer professional user -is a person in a profession involving
computers who has had formal education in the technical aspects of
computers; an example is:
(Any 01 x 1 = 1 mark)
Examples of users.
Computer programmer
System analyst
System administrator
Database administrator
Network administrator.
(Any 01 x 1 = 1 mark)
Importance of users – • Data entry
manipulating the computer system
programming the computer
administering the network
analyzing the computer system
(Any 02 x 1 = 02 marks)
120
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
• Communications hardware facilitates connection between computers
and computer systems over phone lines and other channels.
This is the linking of one device of a computer to another.
(Any 01 x 1 = 1 mark)
Examples are:
Modems
Cable
Computer
fax modems
routers
gateways
(Any 01 x 1 = 1 mark)
Importance of communications
Linking up computer devices and computers
Enabling the flow of data
Enabling the flow of information
Enabling the flow of instructions
Networking of computers
(Any 02 x 1 = 02 marks)
28. “The Internet is a harmful tool to man”. What is your opinion?
Positive aspects of internet:
Personal/business connectivity – through E-mail, chatting, video
conferencing, websites, etc
News updates through online news groups and news rooms.
Secure online data storage.
Internet based education and research e.g. online training, publications, .
Tool for entertainment and leisure through online games, music and video
clips, visiting of electronic zoos, etc.
Promotion of business through internet based trade and commerce
(Ebusiness and E-commerce). Business-to-consumer (B2C) e-
commerce
consists of the sale of goods to the general public. Consumer-to-
consumer (C2C) e-commerce occurs when one consumer sells directly
to another, such as in an online auction. Business-to business (B2B)
e-commerce consists of businesses providing goods and services to
other businesses.
Promotion of medicine and health through online medication and health
care.
Promotion of banking and finance through online banking.
121
FINAL PAPER 2009
122
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Accident arresting through smoke, fire, poisonous gasses emissions
detecting computer installations.
(Any 10 x 2 = 20 marks)
SECTION A
1. C 5. D 9. A 13. B 17. C 2B 6. D 10.D
14. B 18. B
3. C 7. B 11. A 15. D 19. D 4. A 8.C 12. B
16. A 20. A
SECTION B
Qn. 21. Solutions
(a) Characteristics of a computer;
• Speed: i.e. Computer operations are in millions or thousands of
calculations per second.
• Accuracy: i.e. Computers are thorough once the right instructions and
data are entered.
• Storage: i.e. Computer can store huge volumes of data without losing it
through their storage devices like hard disks, flash disks, CDs, etc.
• Versatility: i.e. Computers can handle many various tasks at the same
time or one at a time. Capable of multitasking.
• Diligence/consistency: i.e. Computers can execute tasks repetitively.
• Automation: i.e. Computers work with minimal or no human intervention.
(Any 3 x 2 = 6 marks)
(b) Examples of personal computers
• Hand held PCs; PDA like Palm VII, Sinclair 2481, TRS – 80, etc.
• Portable PCs like; Small laptops, Osborne I, Outran PCs, etc.
• Business PCs like; Apple Lisa, TRS-8011, DRC-300, etc.
• Professional PCs like; TRS-8011, HP 85/6, etc • Consumer PCs like;
ATTARI 1400, TI – 99/41, etc.
(Any 2 x 1 = 2 marks)
(c) Uses of computers in the area of entertainment:
• Audio and video clips
• Playing computer games
123
FINAL PAPER 2010
124
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
enables a user to create, send, receive, forward, store and print email
messages. (02 marks)
(ii) Examples of browser
- Ms internet explorer
- Netscape navigator
- Mozilla fire fox
- Google chrome
- Conqueror Any 2 x1 = 02
marks)
Examples of E- mail software
- Ms outlook express
- Eudora light
- Web mail Any 2 x1 = 02 marks)
(b) (i) Search engine refers to software program that can used to
locate websites, pages and files on the internet. Or program that enables
one to search for resources on the web (internet).
(01 mark)
(ii) Multimedia refers to using computers to integrate text, graphics
animation,
audio and video into pone application.
(c) Examples of webpage authorizing software. (01 mark)
- Micro media dream weaver
- Nets cape composer
- Front page
- Adobe go live
Ms Publisher 2007.
Any 2 (02 marks)
25 (a) (i) BIOS Basic Input and Out put System
(01 mark)
(ii) CMOS Complementary Metal- Oxide Semi conductor
(01 mark)
(iii)
ALU Arithmetic and Logic Unit
(01 mark)
(iv) ICT Information and Communication Technology
(01 mark)
(b) Function of the following
125
FINAL PAPER 2010
126
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
– others are computer aided teaching and computer aided learning,
presentations software, etc.
• Improved entertainment and leisure through computer games, music, etc
for people to refresh and make-up.
• Improved communication and collaboration through computer networks.
• Improved health services where computers facilitate recording,
monitoring, and diagnosis for patients.
• Improved security through computer managed gates and monitoring of
commercial and domestic premises, detecting and controlling crime by
police.
• Reduced production time and manufacturing processes through computer
aided manufacturing and computer aided designing which have greatly
improved the quantity and quality of life.
• Improved customer services delivery and care eg networked computers
provide 24/7 on-line services like credit cards
• Improved business and investment opportunities.
• Improved data and document production, storage and manipulation.
(Any 5 x 2 = 10 marks)
Negative effects of using computers to society
• Computer related crime e.g. forgeries, computer based illegal funds
transfers, etc
• Moral degeneration through morally dangerous clips, messages, etc
• Increased cost of production as computers are very expensive to buy and
maintain. Computer experts can as well be expensive to hire.
• They are both health and environmental hazards e.g. can cause eye
defects, and their disposal after use has got a lot of environmental
concerns.
• Loss of employment as they take over job assignments for semi and less
skilled job functions.
• Deaths and accidents due to computer malfunctioning or explosion.
• Virus threats which has made data storage and safety very vulnerable.
• Erosion of human integrity and creativity as even the smallest calculation
is assigned to the computer. Other cases are GMFs, test tube children,
etc.
• Loss of man-hours as some workers go for unproductive computer based
leisure at the expense of their work.
• Cyber terrorism
127
FINAL PAPER 2010
(Any 5 x 2 = 10 marks)
A 28. Hardware devices for information processing
1. Input device
An Input device is any hardware component that allows a user to enter data
and instructions into a computer.
Keyboard
A keyboard is an input device tat contains keys that allow a user to enter
data and instructions into a computer.
Or
A keyboard is an input device tat contains keys which initiate programmed
routines.
Mouse
A mouse is a pointing device that allows the entering of data and
instructions by controlling a pointer on the screen which the user has to
move on a smooth flat surface.
Trackball
A trackball is a stationary pointing device with a ball mechanism on its top.
Joystick
A joystick is a pointing device with a vertical lever mounted on a base to
control the position of the cursor.
Light pen
A light pen is a handheld pen like pointing device that has a light sensitive
point to select options on the screen.
Touch screen
A touch screen is an input device that permits the entering or selecting of
commands and data by touching the surface of a sensitized video display
device with a finger or a pointer.
Touch pad
A touch pad is a small flat rectangular pointing device that is sensitive to
pressure and motion.
digital camera
A digital camera is an input device tha takes pictutre and store the images
digitally rather than traditional films which image can then be transferred to
the computer using a specialized cable or wireledd technology.
Scanner
A scanner is a light sensing input device that converts printed text and
graphics into digital form for computer use.
Others include:
Optical character recognition reader
Optical maek recognition reader
Barcode reader
128
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Magnetic ink character recognition reader
Magnetic strip reader Sensors
Microphone
Microphone is an input device that allows a user to input voice or sound to a
computer.
MIDI
MIDI short for musical instrument digital interface is an input device that
defines how sounds are represented electronically by digital musical
devices and connected to the sound card of the computer.
Digitizer
A Digitizer is an input device with a graphic tablet on which the user writes
with a pen like device called a stylus.
A terminal is nay device that sends data and instructions to a computer.
2. Processing Hardware
This is a hardware component used to manipulate symbols, number and
letters and controls the other parts of the computer system.
Alphanumeric logic unit (ALU)
Alphanumeric logic unit (ALU) is the hardware which performs the
computers principal logical and arithmetic operations or calculations and
logical operations.
Control unit (CU)
The control unit (CU) is the part of the processor which manages the other
parts of the computer system.
Register
Register is the part which holds one piece of data and instruction one a time
during processing by the CPU.
3. Output hardware
An output hardware is any device used to display or remove information
from a computer to a user.
A monitor is an output device that provides a visual image of both the users
input and computer output.
Or
A monitor or a VDU display information on its screen thus helping the user
to monitor operations carried out by the computer.
Printer
A printer is an output device that produces text and graphics on a physical
medium such as a paper.
Speaker
A speaker is an audio output device that produces sound signals.
Data projector
129
FINAL PAPER 2010
A data projector is an output device that takes the image that displays on
the computer screen and projects it on a lerger screen so that people can
see the image clearly.
Facsimile machine
A Facsimile machine (Fax) is a device that transmits and receives
documents over a telephone line and print it out on paper.
Other include:
Plotter
Terminal
4. Storage hardware
A storage hardware is any device designed to retain data and instructions in
a relatively temporary or permanent form.
Primary memory
Random Access Memory(RAM) is where data and instructions are stored
temporarily during processing.
Read Only Memory(ROM) is where programs are stored permanently.
Secondary storage
Floppy disk(Diskette) is a thin flexible device with magnetic coating
enclosed in a square shaped plastic shell.
A zip disk is like a floppy disk but can store up to 100MB of data.
A compact disk (CD-ROM) is a flat portable storage media that is usually
4.5”(inches) in diameter used to store information using microscopic pits
and lands that are in the middle layer of the disk.
Hard disk is a storage device composed of several inflexible circular disks
called platters.
Magnetic tapes are magnetically coated ribbons of plastic cable of storing
large amounts of data and information.
Flash disk is a storage device that operates as a plug and play device which
is removable and connected using a USB port and usually have fast access
to to data stored in large amounts.
Other include: Memory card, Jazz disk, Magnetic strip cards(ATM), plastic
card Sim card
Sub-Total =5marks x4 Total =20marks
A.29 (a) Advantages of Networking over stand alone
computers
• Facilitate communications e.g. through electronic-mail, chatting in chat
rooms
• Reducing on cost by sharing hardware like printers and software.
• It allows for tight control over who has access to what data.
130
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
• It allows sharing of data and information stored on other computers on the
network.
• It enables online learning and collaborative research
• It allows access to free common databases and databanks like free
software, as in banks like ATM.
• It allows for advertising tools for products and services
• It allows access to more entertainment, leisure, clubs e.g. e-zoos.
• Has enabled improved travel service through e-books and e-reservation.
• News updates can be got on climate, weather, politics, and sports.
• Provides for online employment e.g. telecommuting. Any 8x1=
8marks
(b) Various illustrations of LAN topologies
Bus or linear topology
This is a LAN topology which consists of a single central cable tat connects
all computers and devices together.
Diagram to illustrate a bus or linear topology
Printer
Terminator
131
FINAL PAPER 2010
Printer
Workstation
Mention =1 marks Explanation =1 mark Diagram =1marks
(labeled)
Subtotal =3 marks
Ring topology
A ring topology is LAN topology which consists of a cable forming a closed
ring or loop with all the computers and devices in a network.
Diagram to illustrate a ring topology
Workstation
Mention =1 marks Explanation =1 mark Diagram
=1marks (labeled)
Subtotal =3 marks
Mesh or hybrid
A mesh or hybrid LAN topology is a network topology which combines the
bus, star and ring network to form big network.
Diagram to illustrate a mesh or hybrid topology
Workstation
132
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Mention =1 marks Explanation =1 mark Diagram =1marks(labeled)
Subtotal =3 marks)
Total =20 marks
SECTION B
21 (A) Characteristics of the 3rd generation
- Integrated circuits
- Introduction of Operating systems e.g Multics
- Simple programming languages e.g Basic
- Low cost compared to 1st and 2nd generation computers
- Increased user friendliness.
- Parallel processing.
- Small size in size as compared to 1st and 2nd generation computers.
- Consumption of low electric power as compared to 1st and 2nd generation
computers.
- Increased memory compared to 1st and 2nd generation computers.
- Introduction of mini computers.
- Generation of less heat compared to 1st and 2nd generation computers.
- Introduction of networking.
Any 3 X 1 = 03 marks
(b) (i) Hacking - Gaining illegal (unauthorized) access into computer
installations. 02 marks
133
FINAL PAPER 2011
134
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
5 Totals =SUM(B2:B =SUM(C2:C =SUM(D2:D =SUM(E2:E
4) 4) 4) 4)
Or
A B C D E
1 Juniors Middle Seniors Totals
2 House 1 =SUM(B2:D2)
3 House 2 =SUM(B3:D3)
4 House 3 =SUM(B4:D4)
5 House 4 =SUM(B5:D5)
Explanation 02 marks
Spreadsheet 02 marks
(ii) By summing up all house scores in their respective teams.
Or Any other appropriate formular. e.g =SUM(B2:B4), =SUM(B2:D2) ,
=B2+B3+B4, =B2+C2+D2
02 marks
TOTAL 10 marks
23 (a)
(i) Backspace Key - To delete a character or space to the left of
the cursor position.
Or Ctrl+ Backspace key removes the whole word to the left of the cursor. 1
mark
(ii) Caps Lock Key - To facilitate continuous typing in upper case when
activated. 01 mark
(iii) Delete Key - To remove the character, space, text or
word to the right of the cursor position. Ctrl+Del removes the whole word
to the right of the cursor position. 01 mark
(iv) Space bar - To create space .
- Alignment
- Moving the cursor to the next line.
- Pausing music in some music programmes e.g Power DVD,
- Playing games e.g in pinball
- Resizing or closing the current window with a modifier key e.g Ctrl Key
+Space bar
- Helps in scrolling in some web browsers when used with Shift Key.
135
FINAL PAPER 2011
136
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
- Breakdown of an individual station does not affect other computers on the
network.
- It is simple to install and maintain if compared to other topologies like
mesh and tree.
- There is less noise (electronic) Any 1
X1 = 01 mark
Disadvantages of star topology.
- Breakdown of the central compute or hub leads to breakdown of the
whole network.
- Leads to a “spaghetti” of cables for a large network since each
workstation has two cables to and from the hub.
Any 1X1 = 01 mark
TOTAL =10 MARKS
25. a) Factors to consider when designing a database.
- Number of tables needed
- Number of fields and field names
- Unique identifiers on fields with unique values.
- Relationships between tables if any
- Practicability of the database. Any 2
X 1 = 02 marks
b) Field - is a name given to a particular/specific piece of data/information
about a record.
01 mark
c)(i) L4323 01 mark
(ii) - Air conditioner 01 mark
- Garden 01 mark
(iii) Text 01 mark
(iv) Two validation checks.
- Data type check
- Number of characters (Length of sentence)
- Presence check/primary key
- Consistency Check/pattern matching
- Validation rule/range validation rule Any 2X1 = 02 marks
(v) Reference number 01 mark
TOTAL =10 MARKS
26. a) System software – Programs that start up the computer and
manage the general functioning of the system devices and activities.
02 marks
137
FINAL PAPER 2011
138
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
SECTION C
27. (i) Utility programs are part of system software which are designed to
configure, analyze, optimize and maintain a computer in its working
operations. 02 marks
(ii) Description of Utility programs.
Anti-virus utilities scan for computer viruses and remove them
Backup utilities can make a copy of all information stored on a disk, and
restore either the entire disk
Data compression utilities output a smaller file when provided with a
stream or file.
Disk checkers can scan the contents of a hard disk to find files or areas
that are
Disk cleaners can find files that are unnecessary to computer and can
decide to delete.
Disk compression utilities can transparently compress/uncompress the
contents of a disk, increasing the capacity of the disk.
Disk defragmenters increase efficiency by moving data to one side of
the disk.
Disk partitions can divide an individual drive into multiple logical drives
Disk space analyzers to get the size for each folder/ sub folders & files
in folder or drive. showing the distribution of the used space.
Disk storage utilities
Archive utilities output a stream or a single file when provided with a
directory or a set of files. Archive utilities, unlike archive suites, usually do
not include compression or encryption capabilities.
File managers provide a convenient method of performing routine data
management tasks, such as deleting, renaming, cataloging, uncataloging,
moving, copying, merging etc.
Cryptographic utilities encrypt and decrypt streams and files.
Hex editors directly modify the text or data of a file.
Memory testers check for memory failures.
Network utilities analyze the computer's network connectivity, configure
network settings, check data transfer or log events.
Registry cleaners clean and optimize the Windows registry by removing
old registry keys that are no longer in use.
Screensavers were desired to prevent phosphor burn-in on CRT and
plasma computer monitors Contemporary screensavers are used
primarily for entertainment or security.
139
FINAL PAPER 2011
140
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
- Creating web pages.
- Creation of foot notes and cross references.
- Creation of letters and document, memos etc
- Helps in saving on a storage device
- Helps in formatting and designing of simple office publications.
PREMOCK 2011
SECTION A (20 MARKS)
1.Which of the following is not an example of computer input?
A. OCR.
B. MICR.
C. OMR.
D. LCD.
2.The text you type using a computer is directly stored in ………………….
A. A word processor like Microsoft word
B. Local disk C.
C. A file.
D. RAM.
3.If the computer monitor does not come on when pressing the power
button, it is quite possible that…
A. The keyboard is not connected.
B. The computer is not connected to a UPS.
C. A virus has deleted some of the files.
D. There are some loose or disconnected plugs.
4.…………………………. is an example of a Boolean data type
A. 10001001.
B. $ 200.
C. 26/Apr/2010.
D. On/Off.
5.Which of the following is a database file?
A. Talinamugongo.doc
B. Studentsdata.xls
C. MicrosoftAccess.ppt
D. InvitationLetter.mdb
6.As Juliet was typing a report using MS Word, the power suddenly went off
and luckily enough she had a UPS installed. What will be her most
appropriate action to do now?
A. Turn the lights on.
B. Turn the power switch off.
141
PREMOCK 2011
142
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
B. 40.
C. 4.
D. 5.
15. Which of the following best describes a folder on a computer?
A. A yellow icon/graphic on the desktop
B. A directory where files may be kept.
C. A graphical user interface tool where files saved
D. An enclosure that is created to safe guard documents from being
deleted.
16. What is an operating system?
A. A software which provides an interface between hardware and user,
and is responsible for the management and coordination of all computer
system activities.
B. A software for the computer system
C. A formation of people operating the computer system
D. A huge complex computer system software
17. What happens when the “Print Screen” key on the keyboard is
pressed?
A. The image seen on the screen will be copied to the clipboard to be
pasted later.
B. Whatever is on the screen will be printed.
C. The document seen on the screen will be printed.
D. What You See on the screen Is What You Get when printed.
18. One advantage of a LAN is to…
A. Enable sharing of resources such as printers.
B. Enable the sharing of power source.
C. Help in forming a link between users.
D. Increase processor speed of standalone computers.
19. Which of these is a device which coverts analog signals to digital
signals, and vice versa?
A. Modem.
B. Scanner.
C. Signal Converter.
D. Internet – phone line digital device.
20. “Two thousand Uganda shillings” is entered in Cell B2. What is the
entry in Cell B2 known as?
A. A label.
B. A value
C. A formula.
D. Currency.
143
PREMOCK 2011
(a) State the data types of the fields in the given table.
(04 marks)
(i) SUPPLIER ……………..Text………………… [01 MARK]
(ii) CODE …………………Number……………… [01 MARK]
(iii) DELIVERY DATE …………Date/T ime………………[01 MARK]
(iv) PRICE ………………………Currency………… [01 MARK]
(b) The following search condition is input
(CODE = 5613) AND (PRICE <100).
Write down the output using only the SUPPLIER field.
(01 mark)
……………………………………MO18………………… [01 MARK]
144
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
(c) Write down a search condition that will search for all items with a price
more than ¥50 that will be delivered in October.
(2 marks)
(PRICE > 50) AND (DELIVERY DATE = Between #1/10/07# And
#31/10/07#)
(PRICE > 50) AND (DELIVERY DATE >=#1/10/07#)
(PRICE > 50) AND (DELIVERY DATE >=#1/10/07# And <=#31/10/07#)
(PRICE > 50) AND (DELIVERY DATE =Like "**/10/**" )
[ANY 1 x 2 = 02 MARKS]
(d) (i) What is a primary key?
(02 marks)
A primary key refers to one or more fields whose value(s) uniquely
identify each record in a table.
A primary key is a column or combination of columns whose values
uniquely identify a row in a database table. The primary key(s) have a
unique value for each record or row in the table.
[ANY 1 x 2 = 02 MARKS]
(ii) Which field in the above database can act as a primary key?
(01 mark)
SUPPLIER field. [01 MARK]
22. a) (i) What is a browser?
(2 marks)
A browser is a computer application software for displaying WebPages.
A computer a program used to view HTML documents
A program used to view, download, upload, surf or otherwise access
documents (pages) on the World Wide Web.
[ANY 2 x 1 = 02 MARKS]
(ii) Give two examples of browsers.
(2 marks)
¶Mozilla Firefox,
Internet Explorer,
Safari,
Opera,
Google Chrome,
Netscape Navigator
Konqueror.
Etc.
¶[ANY 2 x 1 = 02 MARKS]
(b) Mention three advantages of using email as a means of communication
(3 marks)
145
PREMOCK 2011
Easy to use. Emails applications have user friendly tools that help
during composing messages.
Email supports sending of attachments like documents, zipped files,
e.t.c
It is very fast in terms of speed: The e-mail is delivered instantly,
anywhere across the globe.
Easy to prioritize: Since the mails have subject lines, it is easy to
prioritize them and ignore unwanted mails.
Email messages can be sent to many recipients at the same time
Emails can also carry hyperlinks that lead to other webpages with just
a click
One can subscribe to news and other online services through email
Email software have management features that help users to organize
their messages in folders like inbox, sent, draft, etc.
Easier for reference: When one needs to reply to a mail, there is a
provision in the mailing system to attach the previous mails as references.
This refreshes the recipient's knowledge, on what he is reading.
Environment friendly: Postal mails use paper as a medium to send
letters. Electronic mail thus, saves a lot of trees from being axed. It also
saves fuel needed in transportation.
Email software have address book features that may be sorted in
alphabetical order.
Email software has a good degree of security features such as
username and password before sign in
Email applications have inbuilt English dictionary which safeguards the
sender from incorrect spelling and grammar.
Email is a relatively cheap means of communication since there are no
printing or postage expenses involved.
There is flexibility in time of opening the e-mail for any time access. At
any time of the day or night, one can communicate with friends, relatives,
professors and business associates.
Messages remain permanent for future and frequent accessing from
anywhere.
Use of graphics such as colorful greeting cards and interesting pictures
can be sent through e-mails.
Advertising tool: many individuals and companies are using e-mails to
advertise their products, services, etc.
[ANY 3 x 1 = 03 MARKS]
(c) Outline three limitations of using Email as means of communication.
(3 marks)
146
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Emails can carry Viruses: The recipient needs to scan the mails, as
viruses are transmitted through them and have the potential to harm
computer systems.
Spam and Junk: E-mails when used to send unsolicited messages and
unwanted advertisements create nuisance called Spam. Checking and
deleting these unwanted mails can unnecessarily consume a lot of time,
and it has become necessary to block or filter the unwanted e-mails by
means of spam filters.
E-mail spoofing is another common practice. Spoofing involves
deceiving the recipient by altering the e-mail headers or the addresses
from which the mail is sent.
Hacking and email interception: The act of unauthorized attempts to
bypass the security mechanisms of an information system or network is
termed as hacking. After the e-mail is sent and before it is received by the
desired recipient, it "bounces" between servers located in different parts
of the world. Hence, the e-mail can be intercepted by a professional
hacker.
Misinterpretation: One has to be careful while posting any kind of
content through an e-mail. If typed in a hurry, the matter could be
misinterpreted.
Since the content posted via e-mails is considered informal, there is a
chance of business documents going unnoticed. Thus, urgent
transactions and especially those requiring signatures are not managed
through e-mails.
Crowded inbox: Over a period of time, the e-mail inbox may get
crowded with mails. It becomes difficult for the user to manage such a
huge chunk of mails.
Need to check the inbox regularly: In order to be updated, one has to
check his e-mail account regularly, which may be expensive in the long
run.
Email cannot be used without computers especially in remote areas
without electricity
In case one forgets his/her password, signing in is not possible and
this can lead to loss of information.
Email may violate privacy in case someone else gets to know your
user password since the other may check your mails.
[ANY 3 x 1 = 03 MARKS]
23. a) What is a computer network?
(2 marks)
147
PREMOCK 2011
148
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
24. (a) Mention any three characteristics of computer software. (03
marks)
Computer software is intangible
Computer software gives instructions/procedures to computers
Computer software is copyrighted
Computer software can be installed
Computer software is executable
Loads into Memory when running
All software has a source Code written by a programming Language.
[ANY 3x 1 = 03 MARKS]
(b) Define ‘system software’.
(01 marks)
System software refers to programs that control the operations of a
computer its self and all its devices.
System software is computer software designed to operate the
computer hardware and to provide maintain a platform for running
application software.
[ANY 1 x 1 = 01 MARKS]
(c)Name the three categories of system software giving an example in
each case. (06 marks)
(i) Operating systems [01 MARK]
Example:
DOS,
Windows,
Linux,
Unix,
Vista
etc ………
(ii) Utility programs – [01 MARK]
Example:
Antivirus utility – Prevents, detects and removes viruses.
Uninstaller utility removes programs.
Folder management utility - creating, viewing, deleting and rearranging
files and folders Compression utility - reduces the size of files to free disk
space
Disk Defragmenter – Recognises the files and unused space on a hard
disk so that data more quickly.
Backup utility – allows a user to copy, or backup files from one
disk/storage device to another.
149
PREMOCK 2011
150
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
KPresenter,
Screencast,
Adobe Persuasion,
AppleWorks,
[ANY 2 x 1 = 02 MARKS]
26. (a) What is a computer?
(02 marks)
A computer is an electronic device that accepts user input (data),
processes it under special instructions (programs), to produce the desired
meaningful output (information).
A computer is a programmable machine that receives input, stores and
manipulates data, and provides output in a useful format.
[ANY 1 x 2 = 02 MARKS]
(b) Mention five areas where computers can be used/applied in our society
today. (05 marks)
Education, e.g. Use of Interactive whiteboards and projectors during
teaching.
Research, e.g. searching different literature on the World Wide Web.
Business, .e.g. new jobs like Programmers, web designers, ICT
teachers.
Health, e.g. Diagnosis such as Heart rate, blood pressure, etc. is aided
by Computer Expert systems
Communication, e.g. use of E-mails to send and receive Messages
worldwide.
Military/security, e.g. monitoring security through computerized camera
systems.
At home. E.g. for using Internet, for accomplishing school/work
assignments and Managing household finances.
Entertainment / leisure e.g. Computer games, chats, etc.
[ANY 5 x 1 = 05 MARKS]
c) Mention any three measures that should be taken to ensure safety of
computers. (03 marks)
Always switch on and off the computer in correct order.
Keep the Laboratory free of dust.
Avoid making hardware connections when the computer is on.
Don’t bring food and water near the computers to avoid accidental
rusting and corrosion
Computers should be regularly serviced.
Avoid high temperatures and direct sunlight.
Use power stabilizers or UPSs to ensure steady power.
151
PREMOCK 2011
152
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Print: Allows you to send a spreadsheet file to a printer to get a
hardcopy or many hardcopies as you would like.
Thesaurus: A built-in thesaurus that allows you to search for synonyms
(words with similar meaning) and antonyms (‘opposites”) without leaving
the word processor.
Graphics: The spreadsheet application permits the addition of various
types of graphics, such as bar charts, line charts, clip art, and
photographs.
Filter
Wrap Text, etc.
[ANY 5 x 2 = 10 MARKS]
b) Briefly explain five advantages of using Microsoft Excel.
Microsoft Excel can perform mathematical, statistical, and financial
calculations quickly and accurately.
The rest of the worksheet is recalculated whenever data in one place
changes.
Microsoft Excel has built-in functions and macros which made work
easy.
Calculation is always accurate, provided that data and formulae entered
are correct.
Microsoft Excel offers different options of data presentation such as pie
charts, bar graphs, etc.
Microsoft Excel is very useful for applications that require modeling and
what-if analysis.
They easily filter, sort, and arrange data in alphabetical order for better
organization.
Workbooks can be saved in soft copies that can be easily modified and
reused in future.
The ability to be able to apply different types of fonts and cell formatting
to your spreadsheet
The ability to spell check the whole spreadsheet
Easy to make changes and corrections (ease of edit and format) to data
on the worksheet.
[ANY 5 x 2 = 10 MARKS]
28. Why should a school have a website?
(20 marks)
A website is a collection of hyperlinked html documents (web pages) with
related information, meant to creating awareness about something on the
internet. [DEFN 2 MARKS]
Below are the major reasons why a school should have a website:
153
PREMOCK 2011
154
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Categories Input hardware
(Any 02 x 1 = 02 Processing hardware
marks) Storage hardware
Output hardware
Communications hardware
Examples Monitor keyboard,
(Any 01 x 1 = 01 mark) mouse,
CPU
Printer
Categorie
s
(Any 02 x
1 = 02
marks)
155
PREMOCK 2011
156
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
a piece of music, a song etc.
Examples Letters and symbols (e.g., a, b, c, &, ...)
(Any 02 x 1 = 02 mark) words
Numbers/digits
Dates
Musical notes
Audio (sound),
graphics,
Video, etc.
Networking of computers
157
RESOURCEFUL MOCK 2011
158
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
D. procedure
8.121 is expressed in base:
A. Binary
B. Octa
C. Hexa
D. Penta
9.………………….. is the one-word term used to refer to the setup
procedure of putting new programs into our computer?
A. Copying
B. Encrypting
C. Installation
D. Compressing
10. The Internet offers different services. Which one listed below is
incorrect?
A. Chat room
B. Electronic mail
C. Off line shopping
D. World Wide Web
11. A software package obtained without license is said to be:
A. pirated
B. duplicated
C. original software
D. shared
12. The CPU consists of:
A. ALU and CU
B. The CU only
C. The ALU only
D. Programs only
13. The device used in a data communication network to perform the
conversion between analogue and digital signals, is called a …
A. front end processor.
B. modem.
C. decoder.
D. multiplexer.
14. If you look carefully at the motherboard, you will notice that some chips
are soldered to the board whilst others are plugged into the board. The
removable chips allow you to ...
A. add extra power sources to your computer.
B. integrate the ALU and the system clock unit.
C. re-arrange the layout of your motherboard.
159
RESOURCEFUL MOCK 2011
160
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
3. D 7. B 11. A 15. A 19. B
4. B 8. D 12. A 16. D 20. D
SECTION B
21 (a) (i) What is the main reason for using BIOS by the computer?
It performs a hardware check and makes sure that certain crucial
pieces of hardware are present and functioning properly.
For example, it makes sure there is a video card, a CPU, memory, and
a power supply providing proper voltages.
It performs memory check
Configure devices as needed,
Identify the boot drive, and controls the boot sector on the boot
drive, which launches the operating system.
(ii) I saved my documents on the hard drive 5 minutes ago. I have
continued to work. Where is the latest copy of my
RAM (Random Access memory)
(b) Mention two types of buses that affect the speed of computer?
Buses are the set of wires that carry special information to or from the CPU.
There are three types of buses
They are:
Address buses: these buses carry address given by the CPU from one
unit to another in the computer.
Data buses: These buses carry data from one unit to other; it is a bi-
directional bus i.e. the data can be carried in both directions.
Control signal: These buses carry control signal from ALU to memory and
from memory to ALU and then to the output unit
The buses that affect the speed of a computer are those ones connected to
the CPU
- Address bus; the address bus determines the number of individual
memory locations the micro processor is capable of addressing.
161
RESOURCEFUL MOCK 2011
Slow in processing
information
- Control signal: These buses carry control signal from ALU to memory and
from memory to ALU and then to the output unit
(c) List four instances where a computer will require a warm boot
Installation of new hardware
Installation of new software
When a computer freezes
Some components where not connected like the keyboard, mouse
etc
(d) What reason would you give for buying a new video card?
Outdated and it is no longer capable of running the latest video games
Worn out cards
22. (a) State two ways of keeping data secure for an organization
Using passwords
Data encryption
Bio metric
Using screen savers
Call back systems
Installation of the antivirus
Firewalls
Copy rights and licensing agreement
(b) Mention three features that make up a font
Weight
Slope
Optical size
Metrics
Letter Case
Color
(c) Outline four causes of fire accidents in a computer lab
Carrying of water and food in the laboratory
Short circuits due to poor wiring in the laboratory
Unstable power supply
Poor quality power cables
Unnecessary moving of equipment in the laboratory
(d) State one function of Light Emitting Diode on a computer’s system
Unit
Light emitting Diode (LED) are lights on the system unit that;
Show that the computer is on
162
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Show that storage devices like CDROM Drive, Hard disk Floppy disks are
installed
Show that the computer is processing data
23. (a) Define the following terms as used in spreadsheets applications
(i) a cell
A cell .is the intersection of a row and column
(ii) Work book
A work book is a collection of work sheets
(iii) Auto fill handle
This a feature in spreadsheet that helps to automatically fill cells by copying
the function or formula to the other cells
(c) Mention two practical uses of a screen saver to a computer user
Entertainment - The most common reason we use screensavers is for
the fun of it.
Security - By setting up a screensaver with password protection
Uniform look - Many companies require all employees to use a particular
screensaver.
Advertisement - Companies, particularly retail businesses, that have
computer in areas accessible to customers will often have a screensaver
that promotes their business or product.
Information - A lot of screensavers provide either static or real-time
information.
(d) State any two examples of desktop publishing software programmes.
Microsoft office Publisher
Adobe page maker
Adobe InDesign
Adobe PageMaker
QuarkXPress
FrameMaker, now owned by Adobe
Greenstreet
InPage -
Interleaf
iStudio Publisher -
Microsoft Word 2008
Ovation
Pages
PageStream
Prefis BookMachine
(ii) What is the meaning of cell merging as used in spreadsheets?
163
RESOURCEFUL MOCK 2011
164
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Printers, mice, printers. Scanners, speakers, external hard disks, flash disks
etc
(c) Distinguish between plug and play and hotspot as used in connecting
computer peripherals
Plug and play is where a device is connected to the motherboard and
immediately starts working; it does not require drivers to install. While a
hotspot is where a devices is connected to the computer through other
devices or networks e.g. wireless speakers and printers using Bluetooth
etc
(d) Mention any two tasks carried out by a network administrator
Installation of new hardware and software on the network
Managing network traffic
Testing new network hardware and software
Advises the organization on items to buy for the network
Configures the network and provides network usernames and passwords
26. (a) Statement why an adult should use internet banking
It is fast
It is reliable
Prevents security risks
Withdraw can be done any time any where
Money can easily be converted in to any currency
There are interests given to members
(b) I downloaded MP3s of my favourite pop group from the internet. What
software is used to play it on my Pc?
Windows media player
Power DVD
VCL player
GOM player
(c) Suppose someone sends you an email when your computer is switched
off and disconnected. Will the email be lost?
No, Email is an electronic message that is stored in the email inbox of your
account in space.
(d) State any two factors that influence the speed access to the network
Bandwidth
Number of computers connected to the network
Type of net work media used
Topology
Location of your computers on the network
SECTION C: 20 MARKS
165
RESOURCEFUL MOCK 2011
166
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
JJEB 2011
167
JJEB 2011
168
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
169
JJEB 2011
170
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
171
JJEB 2011
172
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
173
FINAL PAPER 2013
174
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
175
FINAL PAPER 2013
176
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
177
FINAL PAPER 2013
178
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
179
FINAL PAPER 2013
180
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
181
EXTERNAL MOCK 2014
182
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
4. A set of low power light that keeps blinking to show the status of the
hard drive is
A. Input device
B. Processing device
C. Storage device
D. Output device
5. A feature in word processors that automatically takes a word to the next
line when
typing is called
A. Word wrap
B. Wrap ring
C. Wrap round
D. Wrap siding
6. What is the work of a slide master?
A. It controls transition effects
B. It controls animation effects
C. It controls certain text characteristics and background
D. It can control all the above.
7. To login your e-mail account you should enter a
A. Username and access control
B. Password and username
C. Access control and password
D. Phone number and password
8.…………………….. refers to the number of computers controlled by a
central host computer.
A. Servers
B. Stand alone
C. Clients
D. Switches
9. Which of the following types of disks allows writing once and no
further editing can be
done.
A. CD-ROM
B. CD-R
C. CD+RW
D. CD-RW
10. Ability of a computer to run without supervision means that it is
A. Programmable
B. Diligent
C. Versatile
183
EXTERNAL MOCK 2014
D. Automatic
11. In word processor, a ruler is commonly used to.
A. Measure distance of a workspace
B. Show distance of indents position
C. Distance of text
D. Length of footer
12. The operating system is involved in all of these tasks except
A. Uninstalling programs
B. Administering security
C. Spooling
D. Saving word documents
13. This is an e-mail feature which allows one to send a similar copy of mail
message to two or more different people.
A. To.
B. Bcc
C. Reply
D. Bc
14. The ………………. stores data temporary in a central processing unit.
A. ALU
B. CU
C. Register
D. Accumulator
15. Which of the following are related to database programs?
A. Procedures, slide view and records.
B. File Records, fields and data type.
C. Record and answer.
D. Slide and data structure.
16. Un authorized access through a computer’s firewall is termed as
A. Script kidding
B. Cracking
C. Hacking
D. Piracy
17. A e-mail travels in small envelopes called
A. packets
B. Switches
C. Strings
D. Headers
18. The best way of controlling spread of a computer malware is by
installing
A. Virus Firewall.
B. Malware Server
184
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
C. Computer games.
D. Anti-virus software.
19. Twisted pair, coaxial cable and microwave are types of
transmission……..
A. Chains
B. Media
C. Data
D. Information
20. A computer program used to display information on the internet is called
A. Gopher
B. Browser
C. Website
D. Home page
ANSWERS SECTION A
1. D, 2. A, 3. A, 4.D, 5.A, 6.D, 7. B 8. C,
9, B.10, D.11, A, 12. D, 13. B, 14. C, 15. B,
16. C, 17. C, 18. D, 19. B, 20,B
SECTION B
21. A sports shop owner uses a spreadsheet to calculate his profits. This is
part of the spreadsheet:
A B C D E F
185
EXTERNAL MOCK 2014
(a) Give the reference of the cell that contains Shs. 4200.
(1 mark)
……………………………………C5…………………………………………
(b) How many columns are shown in this part of the spreadsheet?
……………………………6 columns……………………………………………
(1 mark)
(c) Write down the formula which was entered in cell D2.
(1 mark)
…………………………………=B2-C2……………………………………………
(d) When the spreadsheet was created a similar formula to cell D2 had to
go in cells D3 to D6. Describe how to enter these formulae without typing
them. (2 marks)
…………To copy the required formular from C2 to other cells, activate Cell
D2, click and drag its fill handle (black square dot at bottom right corner of
cell) over the cells D3 to D6…………
………………………………………………………………………………………
……………
(e) Write down the formula which should be entered in cell F2 to calculate
the overall profit got after selling all the 126 flasks in stock.
(1 mark)
………………………=D2*E2………………………………………………………
………
(f) Write down a function that can be entered in cell F6 to calculate the total
profit for the shop owner.
(1 mark)
…………………=SUM(F2:F6)…………………………………………
(g) Which spreadsheets feature was used to join the cells F1 to F5 into one
combined cell?
(1 mark)
……………Merge cells………………………………
(h) Apart from performing calculations, mention any other two other tasks
that spreadsheet software can perform for the shop owner.
Performing What-if Analysis on data
Creating charts and graphs.
Sorting text (Alphabetically or otherwise)
Acting as a small database, etc.
22. (a) With examples, distinguish between Custom-made applications
and Off-shelf applications
(04 marks)
186
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Off the shelf software; it is a form of application programs that are sold by
software vendors ready for use.e.g Microsoft office application programs.
Customized software; this is a form of software that is created by
programmers on user’s request to perform specific function.e.g school
fees management software or supermarket sales management
application.
187
EXTERNAL MOCK 2014
(c) State any two factors considered to create a good presentation. (02
Marks)
Simplicity in design
Consistency in design
Font size clarity
Suitable Background
Font color (good color contrast)
Relevant images
Suitable animations
Suitable transitions
(d) (i) Define the term multimedia as related to presentations(01 Mar ks)
Refers to use of computer program to integrate text, graphics, audio, sound
and video into a single file or medium of communication.
(ii) Give the difference between slide and handout mode of Printing.
(02 Marks)
Slide option enables the use to print each page of the presentation
independently while handout option enables you to print multiple pages of
a presentation on a single page.
24. (a) (i) Define booting of a computer
(01 Marks)
Refers to starting or restating of a computer system.
Or Loading of an operating system into memory or resetting it.
(ii) List and explain two types of booting (02
Marks)
(i) Cold booting refers to stating of a computer from power off status
(ii) Warm booting refers to restating of a computer when it has been on.
(b) Differentiate between system configuration and trouble shooting
(02 Marks)
System configuration is a tool that can help to identify problems that might
prevent operating system from loading while trouble shooting is a process
of fixing technical problem that has failed the computer to operate
normally.
(c) (i) What is software installation? (01 Marks)
It is the act of making a computer program ready for execution.
(ii) Mention two devices on which software can be installed (2 Marks)
Phones
I Pads
Laptops
Tablets
(iii) Explain two factors you would consider before installing software on
a computer. (02 Marks)
188
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
189
EXTERNAL MOCK 2014
(ii) State any three pointing devices you know. (03 marks)
Mouse
Track ball
Touch pad
Track Point
Joystick
Digitizing tables and Stylus pen,
Touch screen etc.
26. Babirye owns a company which has a small LAN of computers.
(a) Give two advantages of having computers networked. (2 marks)
Only one printer is needed, Only one scanner is needed (Sharing of
hardware)
Data can be shared between computers/data can be accessed by one
computer from another more easily
Software can be shared/updated more easily
All computers can access the internet through one connection
(b) She wants to connect the LAN to the internet. Name the device he
would need to be able to do this. (2 marks)
Router / Modem
(c) Give two benefits and two drawbacks of connecting to the internet. (4)
Benefits:
Can communicate with other companies by email
Can use the internet to place orders
Can use the internet to buy materials
Can hold video conferences
Can create own website to publicise company
Drawbacks:
Workers may access undesirable sites
Workers may waste time playing games/going on social network
sites/updating their blog/
online shopping/banking
Viruses/malware could be downloaded
Could make the company susceptible to hackers
(c) (i) Different between a website and webpage (01 Marks)
A website is a collection of related web pages while a we page is an
electronic document about a particular subject stored on the world wide
web.
(ii)Explain two benefits Babirye will realize if she creates a website for her
company. (02 marks)
190
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
It provides an online presence for her company
It advertises services and goods offered.
It facilitates communication
It facilitates online registration
It facilitates on line assessment in case of a school
It facilitates collaborative research
SECTION C
27. (a) Differentiate between a computer virus and a bug
Is a computer program which attaches its self to the system and alters the
normal functioning of the computer while a bug is an error in a computer
program.Or
A malicious program that replicates files and result into loss of data or
malfunction of the computer while a bug is an error in a computer
program.
(b) Discuss the various ways which can be adopted to protect
computers from virus infection.
28. Explain ten ways how the internet is used to commit illegal activities.
Writing malicious codes to infect computers i.e. viruses
Accessing of computer resources illegally (hacking)
Using software without license (piracy)
Phishing
Spamming (sending unsolicited messages)
Cyber terrorism.
Cyber bullying
internet fraud
Broadcasting immoral material /literature (pornography and slander)
Forgery
Changing the source code
Plagiarism
Cracking
Eavesdropping
Tapping
Vandalism
29.(a) Define the term network topology.
Is an arrangement of computers or other communicating devices to
facilitate communication in a network.
(b) With illustrations explain four network topologies.
191
WAKISSHA 2014
WAKISSHA 2014
192
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
193
WAKISSHA 2014
194
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
195
EXTERNAL MOCK 2015
196
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
C. move
D. delete and recreate
8.The ………. , or typeface, defines the appearance and shape of letters,
numbers, and special characters.
A. font
B. font size
C. point
D. paragraph formatting
9.The paragraph mark (¶) is a formatting mark that indicates where
the ……. was pressed.
A. TAB key
B. SPACEBAR
C. ENTER key
D. SHIFT key
10. Press the ENTER key in all of the following circumstances except
A. to begin a new paragraph.
B. to insert a blank line into a document.
C. in response to certain Word commands.
D. when the insertion point reaches the end of the current line.
11. Chief component of third generation computer was
A Transistors
B Vacuum Tubes and Valves
C Integrated Circuits
D Microprocessors
12. To erase a character to the right of the insertion point, press the
……….. key.
A. CANCEL
B. BACKSPACE
C. DELETE
D. either B or C
13. The easiest way to select a cell (make it active) is to
A. type the cell reference in the status bar.
B. type the cell reference in the formula bar.
C. use the mouse to move the block plus sign to the cell and then click.
D. use the function keys located at the top of the typewriter keys on the
keyboard.
14. The ………… is the small black square located in the lower-right
corner of the heavy border around the active cell.
A. sizing handle
B. fill handle
197
EXTERNAL MOCK 2015
C. move handle
D. marquee
15. All of the following are valid Excel arithmetic operators except
A. ^.
B. * .
C. %.
D. >.
16. In an Excel spreadsheet the formula: =IF(B4<=$B$24, $B$19, 0) is
assigned to cell B9.
If the value in cell B4 is 15, value in cell B19 is 10 and the value in cell B24
is 5. Which of the following will be displayed in cell B9?
A. 0
B. 5
C. 10
D. 15
17. In Microsoft Access, a database consists of a collection of
A. tables.
B. worksheets.
C. documents.
D. linked lists.
18. A field with a(n) ……… data type can store a unique sequential
number that a DBMS assigns to a record and increments by 1 as each
new record is added.
A. Sequential
B. AutoIncrement
C. AutoNumber
D. Automatic
19. Identify the odd man out:
A. Plotter
B. Monitor
C. Scanner
D. Speaker
20. A computer program that operates or controls a particular type of
device that is attached to a computer is known as:
A. a driver
B. an operator
C. an application software
D. the operating system
ANSWERS – SECTION A
198
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
1. D, 2. D, 3. C, 4. D, 5. D, 6. B, 7. B, 8. A, 9. C, 10. D, 11. C, 12. C, 13. B,
14. B, 15. C, 16. A, 17. A, 18. B, 19. C, 20. A
199
EXTERNAL MOCK 2015
– drawing line of unit gradient (on a scatter graph of total cost versus
maximum allowance)
– compare values on graph to determine if exceeded
(d) Write down a function that can be entered in cell B8 to calculate the
average Tariff Sunday to Thursday and describe the spreadsheets
feature that can be used to apply this function to automatically generate
averages for column C to G.
(3 marks)
=AVERAGE(B2:B7). The fill handle can be used to copy the formula to
other cells. This can be done by clicking the bottom right corner of cell B8
across cells C8 to G8
(e) A macro was written to convert the tariff rate into different currencies.
The exchange rate was taken directly from a website. What is the
advantage of using a macro to do this? (2 marks)
– automatic calculation
– no need to create formula (etc.) every time on the spreadsheet
– can be assigned to a keyboard shortcut and launched
22. Andrew is sending a large document to a printer.
(a) State the name for the area of memory used to store temporarily the
data being sent to the printer.
(01 mark)
…………………Any one from: – buffer or – RAM……………
(b) State a keyboard shortcut for printing used in word processing.
(01 mark)
…………………Ctrl + P………………………………………………………
(c) The printer runs out of paper during the printing job. A signal is sent
back to the computer to temporarily stop its current task. Name this type
of signal. (01 mark)
………………………interrupt………………………………………………
(d) When trying to save this document after it was printed, the computer
stops responding.
Give two reasons why the computer might stop responding.
(02 marks)
Any two from:
– hardware problem (e.g. head crash on disk drive)
– software “glitch”
– viruses
– disconnected printer cable
– automatic update in progress
– too many applications open
200
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
(e) Andrew ended up losing his electronic document. How could that have
been prevented?
(01 mark)
Any one from:
– backup the document
– enable automatic saving of work
– manually save document every 10 minutes
– save before printing
(f) With an example in each case, explain the difference between impact
printers and non-impact printers. (04 marks)
Impact printers operate by having an element strike the paper. For example
a dot-matrix impact printer.
Whereas
The print heads of non-impact printers do not strike the page. In an inkjet
printer, a print head sits a small distance above the page and either
sprays ink or pops a bubble of ink onto the paper.
23. (a) What do you understand by the term slide presentation? (01 mark)
A collection of pages arranged in sequence that contain text and images for
presenting to an audience.
(b) Define the following terms as applied to presentation software.
(04 marks)
iv. Slide Sorter View
Slide sorter view is window that displays thumbnail versions of all slides in a
presentation, arranged in horizontal rows. This view is useful for
rearranging or deleting slides.
v. Transition
transitions are the effects that occur in Slide Show view when you move
from one slide to the next during an on-screen presentation.
vi. Hotspot
An invisible hyperlink, transparent hyperlink, or invisible action button that is
used as a hyperlink to another action. Actions can include moving to
another slide in the presentation, starting another program, playing a
sound or opening a Web page on the internet.
vii. Master Slide
A slide master is the slide that stores information about the theme and slide
layouts of a presentation, including the background, color, fonts, effects,
placeholder sizes, and positioning. The main purpose of a master slide is
to ensure a consistent look and feel to a set of slides that are based upon
it. So a master slide is a kind of template.
(c) State any two factors considered to create a good presentation. (02)
201
EXTERNAL MOCK 2015
Choose a font size that your audience can read from a distance.
Make labels for charts and graphs understandable.
Use high contrast between background color and text color.
Check the spelling and grammar.
Use art and graphics to help convey your message.
Use the slide master feature to create a consistent and simple design
template. It is fine to vary the content presentation (i.e., bulleted list, 2-
column text, text & image), but be consistent with other elements such as
font, colors, and background.
Simplify and limit the number of words on each screen. Use key phrases
and include only essential information.
Limit punctuation and avoid putting words in all capital letters.
Use contrasting colors for text and background. Light text on a dark
background is best. Patterned backgrounds can reduce readability of text.
Avoid the use of flashy transitions such as text fly-ins. These features
may seem impressive at first, but are distracting and get old quickly.
Overuse of special effects such as animation and sounds may make your
presentation “cutesy” and could negatively impact your credibility.
Use good quality images that reinforce and complement your message.
Ensure that your image maintains its impact and resolution when
projected on a larger screen.
(d) State the use of the following keyboard shortcuts when using
PowerPoint presentation software: (5 marks)
i. F5
…………………Launch Slide Show from the first slide…………………
ii. Shift + F5
………………Launch Slide Show from current slide……
iii. Ctrl + M
…………Insert new blank page…………………
iv. Ctrl + Home
……………Jump to beginning of presentation or placeholder.…
v. Esc
…………………… End slide show………………
24. A database was set up to show the properties of certain chemical
elements.
Part of the database is shown below.
Name of Element Atomic Atomic Melting Boiling State at
element Symbol Number Weight Point (C) Point (C) room
temp
202
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
oxygen O 8 16 - 218 - 183 gas
Iron Fe 26 56 1538 2861 solid
mercury Hg 80 201 - 38 356 liquid
bromine Br 35 80 -7 59 liquid
osmium Os 76 190 3033 5012 solid
caesium Cs 55 133 28 671 solid
gallium Ga 31 70 30 2204 solid
Argon Ar 18 40 - 189 - 186 gas
Silver Ag 47 108 961 2162 solid
203
EXTERNAL MOCK 2015
204
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
205
EXTERNAL MOCK 2015
Laptop has a Webcam which he can use to do live video conferencing over
the internet
h.Explain why this laptop may not be suitable for a high school student.
According to the ad, laptop may be too powerful as it was designed for
business users, gamers and graphic designers.
206
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
online shopping or private e- mail and correspondence. Cryptographers design
systems, break systems, and do research on encryption.
E. INFORMATION SYSTEM MANAGER
Information system managers oversee the work of programmers, computer
specialists, system analysts, and other computer professionals. They create
and implement corporate computer policy and systems. These professionals
consult with management, staff and customers to achieve goals.
F. DATABASE ADMINISTRATORS
Database administrators use database management software to determine the
most efficient ways to organize and access a company’s data. They are
responsible for maintaining database security and backing up systems.
Certifications – MySQL Server, Oracle, and Sybase.
G. SYSTEMS ANALYST
A Systems analyst follows the steps described in the systems development
life cycle.
Analysts plan and design new systems or reorganize a company’s computer
resources to best utilize them.
H. COMPUTER PROGRAMMERS
Computer programmers create, test, and troubleshoot programs used by
computers. Programmers may also update and repair existing programs.
Certifications – Java, C++, Visual Basic and knowledge of SQL.
I. COMPUTER TRAINERS / TUTORS
Computer trainers instruct new user on the latest software or hardware. They are
usually expected to prepare new materials for instruction and may be asked to
write and maintain course manual. A position may also include design and
development of a website for the course. Computer trainers typically teach new
users how to use the latest software and hardware. Experience with the most
popular business software is an advantage.
J. DESKTOP PUBLISHERS
Desktop publishers use computers to format and create publication-ready
material. They may create books, magazines newsletter, and newspapers on
computers using special applications software’s large part of the job is
designing page layout, importing text, and manipulating graphics. Most desktop
publishers work for companies that handle commercial printing accounts.
K. COMPUTER SUPPORT SPECIALIST
Computer support specialists provide technical support to customers and other
users. They may also be called technical support specialist or help desk
technicians. They manage the everyday problems faced by computer users.
They resolve common networking problems and may use troubleshooting
programs to diagnose problems.
207
EXTERNAL MOCK 2015
L. COMPUTER TECHNICIAN
Computer technicians may repair and install computer components and systems.
They may
work on everything from personal computers to mainframe servers or printers.
Some Computer technicians are responsible for setting up and maintaining
computer networks. Experience computer technicians may work with computer
engineers to diagnose problems and run routine maintenance on complex
systems.
Certification – CompTIA’s A+ hardware examination and Network+
M. DATA ENTRANTS
Data entry workers input customer information, lists, and other type of data. Input
devices are typically limited to keyboards, mice, and scanners. Because the
accuracy of recorded data is so important, data entry workers are often required
to verify the accuracy of data they and others have entered.
N. TECHNICAL WRITERS
Technical writers prepare instructional manuals, technical reports, and other
scientific or technical documents. Most Technical writers work for software
firms, government agencies, and research institutions.
O. SOFTWARE ENGINEERS
Most Software engineers analyze user need and create application software.
Software engineers usually have experience in programming, but focus on the
design and development of programs using the principles of mathematics and
engineering. They rarely write codes themselves.
29. (a) Give any four duties / roles of a system analyst.
1.Investigate how information is used, handled and manipulated in an
organization.
2. Identify inefficiencies and ineffectiveness in the current system used by the
organization e.g. delays, high operating costs, huge clerical effort and health
hazards.
3.Analyze the results of the investigation that will lead to designing the new
system.
4. Design a specification of a new system which overcomes the inefficiencies and
meets the organization objectives.
5. Oversees the process of testing during the testing of the system.
6. The analyst acts as a facilitator.
He/She interfaces among many different types of people and facilitates the
development of computer applications through these people.
208
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
2.Computer Programming Knowledge
3.Problem-solving skills (creativity)
4.Interpersonal Relations skills (confidence, persistent, patience)
5.Interpersonal communication skills
6.Ongoing interest in updating one’s knowledge in IT.
Diplomacy Being able to say "no" without being " blunt; displaying tact in dealing with
others.
Interviewing Asking the right questions in order to obtain the information needed.
Directing Giving instructions and communicating user requirements to
programming and support staff.
Patience Continually refining user requirements by requesting - feedback;
tolerating lack of computer literacy and specificity.
Assertivenes Insisting on a course of action or what one believes in, even though it
s may be unpopular.
Leadership Getting work done while keeping the team satisfied, effectively giving
rewards and punishment.
Programmin Converting system specifications into effective and efficient computer
g code.
Speaking Presenting your ideas in a manner easily understood by your audience,
both in group meetings and person to person.
Writing Preparing written documents that accurately communicate ideas in a
manner that is easily understood by intended readers.
Listening Paying attention to and concentrating on what is being said, and asking
questions that refine points about which one is uncertain.
Empathy Being able to understand how others feel; accurately determining what
someone else thinks about an issue.
Sales Promoting the system you advocate; persuading others to accept your
viewpoint.
Politics Understanding what motivates individuals; determining sources of power
and influence in an organisation.
Management Planning, organising and controlling projects so that they get done on
schedule and within budget.
Training Educating users and other non-technical groups on the capabilities of
computers and systems.
Cooperation Working with others productively; resolving conflict in an effective
manner.
30. (a) What is the difference between pseudo code and source code in
programming? (4 marks)
Pseudo code refers to structured English-like phrases that indicate the
program steps to be followed to solve a given problem, but are not
209
EXTERNAL MOCK 2015
executable by a computer.
While
Source code refers to program statements written by a programmer using a
particular programming language, which can be compiled into a working
executable program.
210
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Teachers usually ask questions to students every day. Not all questions are
on the same level. Some questions are easy to answer where other
questions may require a great deal of thinking.
211
FOR TEACHERS: SAMPLE UCE EXAM BLUE PRINT (UNEB 2015)
AND BLOOMS TAXONOMY
212
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
6 System Start-Up and 1 1 2
Configuration
7 Computer 1 1 2
Communication and
Net Working
8 Spreadsheets 1 1
9 Web Designing 1 1 2
10 Data Bases 1 1
11 Elementary Computer 1 1
Programming
12 Trends In Computing 1 1 2
TOTAL 7 7 6 20
NB:
1.The learning abilities were derived from the general objectives in the
teaching syllabus.
2.The questions comprise of cross cutting levels of abilities.
3.The learning ability levels are indicated in percentages as follows.
KNOWLEDGE 35%
COMPREHENSION 35%
APPLICATION 30%
1.Creating ability level is not provided for in section B since it is the
dominant ability level in Section C.
2.Consideration was made for the revised Blooms taxonomy for HOTs and
LOTs.
BLUE PRINT FOR SECTION B
ABILITY LEVELS TESTED PER QUESTION
Q.21 Q.22 Q.23 Q.24 Q.25 Q.26
TOPIC
1 Introduction To Remembe
Computer ring
2 Computer Underst
Hardware andin
g
3 Computer Software Rememb
ering
4 Word Processing Rememb
ering
5 Computer Applying
Presentation
213
FOR TEACHERS: SAMPLE UCE EXAM BLUE PRINT (UNEB 2015)
AND BLOOMS TAXONOMY
7 Communication Understa
and Net Working nding
8 Spreadsheets Applyi
ng
9 Web Designing Evaluatio
n
10 Data Base Under
sta
ndi
ng
11 Elementary Understa
Computer nding
Programming
12 Trends In Applying
Computing
Summary of 1 & 12 2&6 8& 7&9 4&5 3 & 11
Topics 10
214
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
215
FOR TEACHERS: SAMPLE UCE EXAM BLUE PRINT (UNEB 2015)
AND BLOOMS TAXONOMY
216
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
217
FOR TEACHERS: SAMPLE UCE EXAM BLUE PRINT (UNEB 2015)
AND BLOOMS TAXONOMY
218
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
219
FOR TEACHERS: SAMPLE UCE EXAM BLUE PRINT (UNEB 2015)
AND BLOOMS TAXONOMY
220
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
221
FINAL PAPER 2016
222
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
- Had many vacuum tubes
Any1x2= 2marks
(c) Characteristic features of modern computers
-Upgradable
-Multiprocessing
-Multitasking
-They are cheaper
-They are communicative/collaborative/interactive
-They need electrical power
-They are generally portable
-They are cheaper
-They are generally portable
-They are collaborative/interactive/communicative
- speed-means they are very fast and do work in negligible time. E.g.
perform a million
instructions in one microsecond
- Accurate- means they are accurate and errors are due to human error or
program error.
-versatile –means they are capable of performing different tasks in many
different ways.
-Diligence –means that are capable of handling repetitive and boring tasks
over and over again.
-Storage-capable of storing data in large amounts temporarily and
permanently
-They Are Automatic
-Have Artificial intelligence
Any3x1= 3marks
(d) Virtual reality is a technology/system that simulates real world
happenings on a computer e.g. flying a plane, cyber school’s technology.
OR
One can perform a task as if he or she is in the real world using a
computerised system. E.g. Cyber Science Solution, Games
Any 1x2= 2marks
TOTAL=10 MARKS
22. (a) A peripheral device is a device which is connected externally
through ports or by wireless connectivity to the motherboard and can be
removed and lives the computer working.
Or
223
FINAL PAPER 2016
224
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
=LARGE(C2:C8,1)
Any1x1= 1mark
(d) A database management system is a specialised program/software that
permits easy creation of data, access, retrieval and make use of data.
Or
A software used to create a database
Or
A software used to manage a database
Or
A software used to manipulate information in a database
Any1x2 2marks
(e) Activities where database management system can be used
Cataloguing books in a library
Making telephone directory
Making inventories
Capturing patient’s biodata in health units
Capturing student’s biodata in schools
Hotel reservation systems
Employee payroll system
Supermarket goods/stock updating
Accounting/financial system
School management system
Registration system
Report making system
Any1x1= 1mark
(e) (i) Form
(ii) Query
TOTAL=10 MARKS
24. (a) (i) Simplex transmission is a mechanism/mode of data
transmission where
data is transmitted in one direction only.
2marks
Example: - Radio transmission
- Tv Transmission/telecast
- Buzzer alrms
Any1x1= 1mark
225
FINAL PAPER 2016
226
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Or A wrap text is a word processing feature/facility that allows/enables a
user to automatically align and place text in relation to an image.
While
Word wrap is a feature in word processor that allows text/cursor or word to
automatically move to the next line when it gets to the right margin.
Or
Wrap text word with objects while word wrap works with the cursor.
Any1x1= 1mark
(for both parts correct)
(b) Advantages of using word processor over typewriter
Errors can easily be identified and corrected
The work can be saved and got later
The work can electronically be edited which is not the case with a
typewriter
Produces neat work
The work can be displayed in different formats like font face, size
Spell checks/gramma can be done to improve accuracy
Data can be imported/exported to another application
Security of document is assured through passwords
Very silent during working
Allows for automatic generation of figures, indices, groceries etc,
Offer easy and readymade templates e.g. macros, CV formats
Letters/documents can be produced and sent to many people at ago
saving time
Any3x1= 3marks
(c) Why sound may be added to a presentation
Make impact and grab attention of the audience
To cater for people who cannot see
Play a sound to reflect corporate image-like a melody
To indicate the start and end of a presentation
Appealing to emotions
Any1x2= 2marks
(d) A slide master is a slide that holds all the formatting features for the
title, text and any other background items that appear on all slides in the
presentation.
Or
A slide master is a slide that controls or manages effects or appearance of
a particular slide in a presentation
2marks
227
FINAL PAPER 2016
228
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Cost of the software
Nature of business/needs
Available skills or personnel available
Compatibility/flexibility
Platform/portability
Time
Number of users/capacity of the program
Hardware e.g. hard disk capacity, RAM size
Future needs/scalability or expandability
Legal framework off the country
Security level
Portability
Copyright
Quality of the software
Availability of software or software integration
Any3x1= 3marks
TOTAL=10 MARKS
SECTION C
27(a) the help of a laboratory technician can give when the following
error messages appear.
(i) Non-system disk error when the computer system is switched on
He would eject the disk from the drive press any key on the keyboard to
enable the boot process to continue
Restart the computer
Check hardware connection
Reformat the hard disk
Any 1x2 = 02 marks
(ii) Low disk space and computer is slow
He can fix this by deleting some files using disk cleaner utility
He can close some files which are open and would occupy the Ram
Back up and delete from computer
Use of cloud computing
Increase the Ram
Defragmenting the hard disk
File compression
Run anti-virus to scan the device
Increase/slave/add new HDD
Any 1x2 = 02 marks
(iii) Access denied when a user wants to access a particular file
229
FINAL PAPER 2016
Exit or stop programs that are running and could be blocking the users’
tasks from running
Install and run the anti-virus
Adjust users setting to allow access
Provide password
Adjust windows firewall and allow access
Any 1x2 = 02 marks
(iv) Our of memory
Exit or stop programs that are running and could be blocking the user’s
tasks from running
Install or upgrade the Ram by buying another Ram chip and fixing it on
the memory slot of the mother board and restarting the computer to
implement the upgrade
Run a virus scan
Restart the system
Any 1x2 = 02 marks
(v) Device not ready
Disable particular disk drive from the device manager
Give it time to activate
Re-install drivers
Check and change power connection points e.g. USB
Restart the device
Re-install the Operating system
Scan for viruses/malware
Uninstall and or deactivate software blocking the hardware by Deep
freeze
Changes ports where applicable
Disable and enable the device
Any 1x2 = 02 marks
(b) Reasons why Adania’s laptop started to slow down
Not enough Ram
Virus attack or malware infection because of connection to the internet
Low disk space due to many programs stored
Some system files being corrupted
When there is any scanning program runs in the background eg anti-
virus
When files on the disk are fragmented and access time is reduced
Automatic updates
Wear and tear
230
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Any 5 points x 2 = 10 marks
28 (a) Possible observable symptoms that a computer has a malware
Freezing is very often
Unfamiliar graphics /images on the screen
Pop up of scary /warning messages
Posts which you did not post appears on your pages
Denial of access to some system tools
Files disappear mysteriously
Disks change volume e.g. volume name
System speed reduces
Alteration of files
The computer shut down and restarts without any command from user.
Un expected anti-virus disabling
Un precedent loss of memory
Change of keyboard stroke
Corrupting of files
Duplication of files
Creation of shortcuts
Any 5 points x 2 = 10 marks
(b) Explain five measures to put in place to safeguard computers
against malware.
Install anti-virus and regular updating
Activate firewalls
Enforce strict policies on malware
Block unwanted file types at the email gateway
Password computers to stop unauthorised users
Downloading attachments whose source you know
Educate or train users on what to be done in case of misuse
Minimise foreign storage media
Join/connect to secure networks
Buy software from genuine sources
Regulate automatic updates
Any 5 points x 2 = 10 marks
TOTAL=20 MARKS
29(a) Benefits of networking computers in school
It lowers expenses on hardware and software eg printer, anti-virus
Software is easily upgraded via the server
Allow multiple access to the school database or internet
Easy sharing of files and file transfer
231
ACIETEKA 2017
Allow flexible access to the as students and teachers can logon and
access their work from any work station
Collaborative learning is made possible
It enables easy and faster communication
It enables easy access to the internet resources by many students at
the same time
Improved security through centralized administration via the server
Any 5 points x 2 = 10 marks
ACIETEKA 2017
1. _______ computers are also called personal computers
A) Mainframe
B) Mini
C) Micro
D) Super
2. Which of the following is not input unit device?
A) scanner
B) camera
C) plotter
D) digitizer
3. Communication channel is shared by all the machines on the
network in
A) unicast network
B) multicast network
C) Anycast network
D) broadcast network
4. The first machine to successfully perform a long series of
arithmetic and logical operations was:
A) ENIAC
B) Mark-I
C) Analytic Engine
D) UNIVAC-
5. Which one is the largest space?
A) megabyte
B) petabyte
C) terabyte
D) gigabyte
6. Analog computer works on the supply of
A) Continuous electrical pulses
B) Electrical pulses but not continuous
232
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
C) Magnetic strength
D) Binary digits only
7. Which printer is very commonly used for desktop publishing?
A) Laser printer
B) Inkjet printer
C) Daisywheel printer
D) Dot matrix printer
8. Most of the first generation computers were
A) Special purpose computers
B) General purpose computers
C) Both General and Special purpose computers
D) Military purpose computers
233
ACIETEKA 2017
A) Forms
B) Reports
C) Queries
D) Tables
A) Hyperlink
B) Access tables can’t store photos
C) Both of these can be used
D) OLE
A) Bridge
B) Firewall
C) Router
D) Switch
234
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
D) virtual private network
1 C 6. A 11. C 16. D
2. C 7. A 12. B 17. D
3. D 8. A 13. A 18. C
4. B 9. A 14. B 19. D
5. B 10. B 15. C 20. D
235
ACIETEKA 2017
236
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
a) The process of assigning part or all of the drive for use by the
computer is Partitioning
(02 marks)
b) Registry is a central information database for Windows 2000 and
Windows XP organized into a structured hierarchical database to hold
hardware, operating system, and application settings and configuration.
(02 marks)
c)Windows Explorer: allows a user to manage files and directories from a
single graphical interface. (02 marks)
d) The partition used by the operating system to boot the computer is
Active partition. (02 marks)
e) Formatting. Prepares a file system in a partition for files to be
stored. (02 marks)
4. (a) Describe the best method to keep the laptop computer cool.
By placing on a flat surface where vents are unobstructed. Also keep
the vents clean. .(02 marks)
(b)Describe the best method to clean the following components:
i. Laptop keyboard:
Blow compressed air between the keys. Wipe laptop and keyboard
with a soft, lint-free cloth lightly moistened with water or computer-
screen cleaner. (02 marks)
ii. LCD:
Wipe display with a soft, lint-free cloth lightly moistened with water or
LCD cleaner. … (02 marks)
iii. Touch pad:
Wipe surface of touch pad gently with a soft, lint-free cloth
moistened with an approved cleaner.
Never use a wet cloth. . (02 marks)
iv. CD:
Hold the disk by the outer edge of the disc or by the inside edge of
the center hole.
Gently wipe the disc with a lint-free cotton cloth.
Never use paper or any material that may scratch the disc or leave
streaks.
Wipe from the center of the disc outward. Never use a circular
motion.
Apply a commercial CD or DVD cleaning solution to the lint-free
cotton cloth and wipe again if any contaminates remain on the disc.
Allow the disc to dry before it is inserted into the drive. ..(02 marks)
237
ACIETEKA 2017
Start
Enter a,b,c
DISPLAY x1, x2
Stop
238
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
(b) Write the Pseudo code for the algorithm in (a) above. (4 marks)
START
PRINT “Enter the coefficients a, b and c of the quadratic
equation”
READ a, b, c
DISPLAY x1, x2
STOP
(c) Using C or Visual Basic, write source code for a program that can
solve the quadratic equations. (9 marks)
239
ACIETEKA 2017
End Sub
240
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
v. Flexible Access. School networks allow students to access their files from
computers throughout the school. Students can begin an assignment in
their classroom, save part of it on a public access area of the network, then
go to the media center after school to finish their work. Students can also
work cooperatively through the network.
(b) With a well labeled diagram, describe how you can design a computer
network in a room.
(05 marks)
241
JJEB MOCK 2017
242
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
B. Cache memory
C. BIOS
D. Virtual memory.
5.Which one of the following roles is the main function of a software
interface?
A. Storage of information
B. Enable the user to interact well with the software
C. Warning the user in cases of danger
D. Outputting data
6.The computer system maintains it configurations like date and time right
even when the system is switched off from the main power source because
of its?
A. CMOS
B. RAM
C. Automation
D. CMOS battery
7.A single structure representing a set of related data in a database table is
referred to as…..
A. Field
B. Report
C. Record
D. Query
8.The standard protocol for Internet related electronic mails is…………….
A. TCP/IP
B. OSI
C. SMTP
D. NOS
9.Which one of the following data transmission media would offer a user the
least data through-put?
A. Twisted pair
B. Optical fiber
C. Coaxial
D. Microwave
10. An active cell of a spreadsheet can easily be identified by?
A. Name box
B. Formulae bar
C. Worksheet tab
D. Worksheet charts
11. Which one of the following document processors is a word processor
engine?
243
JJEB MOCK 2017
A. Note pad
B. Word wrap
C. WordPad
D. Lotus
12. The power-on self-test (POST) is run by…
A. BIOS.
B. Operating system
C. Log-on
D. Boot strap loader.
13. ……………………is a web page that allows users to make
adjustments in the content previously uploaded.
A. Blog
B. Wiki
C. Aggregator
D. News group
14. Which one of the following statements is true about data values when
they appear in a spreadsheet cell?
A. They are dressed in inverted quotation marks in logical functions
B. They usually left aligned by default
C. They are usually followed by a comma
D. They are usually right aligned in a cell by default
15. Which one of the following is not a navigation tool of slides during a
presentation
A. Hyperlink
B. Action button
C. Remote sensor
D. Slide master.
16. Which one of the following word processor proof reading tools would
enable a user to quickly replace some words in a document with other
words?
A. Autocorrect
B. Autocomplete
C. Spelling and grammar checker
D. Thesaurus.
17. Which one of the following measures would ensure that changes
made on the parent’s table are reflected on the child table?
A. Entity integrity
B. Referential integrity
C. Validity integrity
D. Primary key
244
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
18. When computers are classified as digital or analog it means that they
are being classified basing on…….
A. Physical size
B. Specialty
C. Process
D. Processor power
19. In the mechanical era computers used
………………………………….. for their internal operations.
A. Integrated circuits
B. Diodes
C. Vacuum tubes
D. Gears
20. Which one of the following utilities would one use to prepare a storage
media for data storage?
A. Formatting
B. Debugging
C. Anti-virus
D. Backup
ANSWERS – SECTION A
1. B, 2. B, 3. B, 4. A, 5. B, 6. D, 7. C, 8. C, 9. A, 10. A, 11. C, 12. A, 13. B,
14. D, 15. D, 16. D, 17. C, 18. C, 19. C, 20. A
SECTION B
Attempt all questions in this section
21. (a) (i) state one difference between a micro-computer and a mini-
computer.
Micro-computers offer limited processor power than mini-computers
Micro-computers like hand held computers are more portable than mini-
computers
Micro-computers are generally cheaper than mini-computers
(ii) List two characteristics of personal computers.
Generally offer the computing functions by themselves
They are generally the cheapest
Offer limited processor power
They are more portable than any other category of computers
(b) Give two examples of Hybrid Computers
Hycomp 250
HYDAC 2400
VLSI hybrid computer
Can also give;
245
JJEB MOCK 2017
(c) State two circumstances that can lead to re-installation of the operating
system.
When the hard disk has been formatted
When the operating system blows
When the current O.S is no longer effective in coordinating system
activities. For instance when some basic components are no longer
detected or system takes too long to respond to O.S based instructions
After some thorough virus scan
(d) Give three situations that can necessitate one to warm boot a computer
• When the operating system has frozen or hanged
• When an application program hangs or refuses to run
246
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
• When changing from one operating system (like windows 7) to another (like
Linux), in cases of computers with double or multiple O.Ss.
• When the operating system fails to detect or interact with some peripheral
devices like keyboard, mouse, or modem.
• After installation of some software or programs.
• After installation of some device or peripheral drivers.
• When cleaning a malware (like a virus, Worm or Trojan)
• After configuring or setting up a network
23 Terminating a suspected data tap or hack
(a) Name two situations where electronic spreadsheet application
software can be used in a shop.
They are properties that describe field contents and how the data in it
should be displayed.
(ii) Data types
It is a feature that determines major field qualities, like;
Which formats can be used with the field.
The maximum size of a field value.
How the field can be used in expressions.
247
JJEB MOCK 2017
24. (a) With the help of an example briefly explain the concept of noise in
electronic data transmission.
Explanation
Any unwanted form of energy that tries to interfere with proper reproduction
and reception of wanted signals.
OR
Random undesirable electrical energy that enters into a communication
system and interferes with the transmitted message.
(1 Mark)
Example:
Atmospheric noise or static caused by lightning discharges in
thunderstorms
Short noise
Transit time noise
Partition noise that occurs where current is to be divided between two or
more paths.
(b) Briefly describe the meaning of the following terms as used in electronic
data communication
(i) Wi-Fi
248
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
( ii ) The <body> tag
It is an element that contains the entire contents of a webpage.
(b) Name two electronic presentation features used to navigate slides during
a presentation
Hyperlinks
Action buttons
(2 Marks)
(c) Give two publications that can be created using presentation software
Webpage
Labels
Resume
Invitations
Calendars
Brochure, through templates (Any 2x1
= 2 Marks)
(d) State two end product documents of a mail merge.
Main document or primary file
Mailing list or secondary file or data source
Merged document (Any 2x1 = 2 Marks)
26. (a) With the help of an example define a computer utility software.
249
JJEB MOCK 2017
250
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Used to make special marks of identity characters onto hardware
devices for attachment or belonging.
6. Burglar proof set:
Used to keeping door-ways, vents and windows re-enforced with
metallic or wooden barriers to inconvenience burglars.
7. Ten automatic security lights:
Used to put off wrong doers by keeping places of computer
installations lit in case they attack.
8. G7 model Firewalls kit:
A combination of hardware and software used to filter information
coming through a network. It can be for digital content, devices or
moral protection of system users.
9. Security guard:
This can be in form of live objects used to keep security or scare off
would be burglars and thieves. Can be humans or specialized dogs.
(Any 5x2 = 10 marks)
(b) State five challenges facing computer software in your school.
Piracy
Uninstallation by users
Virus attacks
Interference with source code
Cracking
Loss of product keys
Theft of software product CDs (Any 5x2 = 10
marks)
28. a) Explain five problems that affect normal operations of a computer
system. (10marks)
Physical problems:
• Burglars – Intentionally steal ICT based equipment.
• Terrorists. Maliciously cause damage to computer installations.
• Earthquakes/rainfall/tornadoes/lightning/floods
• Users – employees/visitors/learners. Typical of system cannibalism,
corporate data, hardware and software pilferage.
• Dust: Dust builds thick coatings in slots, ports, internal chips, etc. Dust
coating can also cause unnecessary heat, data and electric insulation.
• Electricity – electric power variations (excessively low or high voltage
causing Circuit/bus cracks, Connection breaks and Chip crapes small
movement or dislocation)
• Electrical Noise – like Electronic static discharge, and Electromagnetic
interferences causing short circuits of devices
251
JJEB MOCK 2017
252
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
o Stealing peoples identity like creating face book or whatsup accounts
with their initials
o Phishing: Where people are tricked to provide personal information only
to be used for wrong reasons
o Promising Get-rich-quick schemes – World Ventures.
o Spoofing: Creation of fake websites or networks to defraud others
o Pharming: A network fraud where criminal redirect network traffic/data to
unintended destinations for selfish gains
viii) Plagiarism.
This involves copying other peoples E-materials and one presents it as
his/her personal work. It is a growing concern in academic cycles where
take-home assignments are given.
ix) Back doors.
They are malwares that allow hidden access to a computer system or ICT
installation.
Other problems include;
• Viruses, worms and Trojans
• Denial of service attack
• Eavesdropping/Tapping:
• Surveillance.
• Industrial Espionage
• Users – employees/visitors/learners. Typical of system cannibalism,
corporate data, hardware and software pilferage.
• Dust
• Magnetic fields – disorganise data on magnetic storage media
• Electrostatic electricity – short-circuit devices like RAM or CPUs
• Acts of rodents and other living organisms like cockroaches.
• Effects of Viruses, Worms and Trojan Horses.
• Spyware: programs placed on computer without user’s knowledge.
Secretly collects information about user.
• Spam: unsolicited e-mail message sent to many recipients
(Any5x2 = 10 marks)
b) Suggest five solutions to the problems identified in question 28 (a) above.
(10 Marks)
• Regular servicing and repair (troubleshooting) by qualified technical
personnel.
• Use of video Closed Circuit Television (CCTV) cameras
• Use of lock and key approach
• Bolting computers and other ICTs to the desks, floor or wall.
• Use of swipe cards or keypads to activate locks
253
JJEB MOCK 2017
254
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
• Use of Anti-virus approach
• Legislation - An effective Software and data safety policy
• Doing periodic software and data audits.
• Regular software updating and upgrading. Most of the newer software
versions and releases come with better to use and secure features.
• Software customisation or personalisation.
• Sensitization – education and training of users on ICTs and network best
practices and policies – e.g., virus alert policies.
• Effective data backup and recovery policy.
• Creating different user accounts and/with passwords for different users.
• Joining secure network/internet service providers.
• Creating backups in locations away from main computing center.
• Use of GPS for online tracking of software and hardware. (Any5x2 = 10
marks)
29. (a) Demonstrate any three methods of error detection in a program code.
Methods of error detection would include:
Use of test data which subjects the new program to a real work
challenge
Compilation – debugging utilities
Dry-run/desk check or walk (3x2 = 06
marks)
(b) Write a simple computer program code which can be used to output your
Surname name and Given name on two lines.
(14 marks)
#include<stdio.h> // Preprocessor Directive including standard
input/output library
int main() // Main function header
{ // Bracket Opening Main function body
printf(“Mukalele”\n); // Displaying Surname and moving to next line
(\n)
printf(“Rogers”); // Displaying Surname
getch(); // (Optional) getch() function pauses execution till a
character is entered
return 0; // Ends program, returns 0 to executor (ie OFF)
2marks
} // Bracket Closing Main function body
(2 marks per line x 7 -- Total 14 marks)
End
255
FINAL PAPER 2017
SECTION A
1.D 8.A 15.C 2.B 9.C 16.B
3.A 10.B 17.D 4.B 11.A 18.D
5.C 12.B 19.A 6.C 13.D 20.A
7.D 14.C
SECTION B
21. (a) Definition of computer evolution
Computer evolution is the gradual
development/improvement/modification/advancement/growth of
computing devices/technology from simple to more complicated and
advanced forms.
NB: Deny marks for stages/generations. 02 marks
(b) The correct terms to complete the statements
(i) Computer
(ii) Data processing
(iii) Data
(iv) Information Each 4x1=4 marks
(c) How computers are used in the following sectors
(i) Health
Disease diagnosis using computer based x-rays, ultrasound scan etc.
Carrying out computer based medical research over the internet
For computerized accounting purposes and billing of patients
Keeping records of patients in a computerized database.
Computerized scheduling of medical staff on duty.
Providing healthcare lessons to patients using digital notes
Communication between medical staff and patients
Computer assisted life savers
Incubating machines for premature babies
For carrying out complex operations on sensitive body organs
For drug prescription
Determination of DNA
Any 2x1= 2marks
(ii) Security
256
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
For forensic computing as in gathering evidence from scenes of crime
Used to monitor places using CCTV cameras
Access control using biometrics devices
Computer based recording keeping by security organs
Communication using internet and mobile equipment in cases of security
emergency
Research on criminal cases using internet
Computer guided fighter planes
Monitoring of security situations by drones
Weapon assembly by the military manufacturing firms
Computer based alarm systems in homes and cars
Detection and detonation of booms and dangerous items like landmines
Tapping and tracking calls for security purposes
Training and educating forces using simulated models
Locating and launching missiles. Any 2x1= 2marks
22. (a) Defining computer hardware
Computer hardware refers to the physical or tangible parts of a computer.
02 marks
(b) Filling in the appropriate categories of hardware
Hardware device Category
(i) Compact Disc Storage
(ii) MODEM Communication
(iii) Projector Output
(iv) Barcode Reader Input
Each 1x4=4 marks
(c) Explaining the functions of components
(i) Power Supply Unit
Steps down voltage
Converts A.C voltage to D.C voltage
Splits or distributes the voltage in different values as required by the
components. Any 1x2= 2marks
(ii) ROM Chip
Permanently Store/hold manufacturers system instructions/information
Used to hold instructions necessary for the booting of the computer.
Any 1x2= 2marks
23. (a) (i) What a wild card is in database management system
A wild card is a special character that can/used/combined/ stand for either
a single character or a string of text in a query criteria or while searching
257
FINAL PAPER 2017
258
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Using firewalls to filter information in a private network Any 2x1= 2marks
(ii) Reasons for preventing access to information on the internet
Prevent online crimes like bullying, fraud etc
Limit or prevent access to illicit materials e.g. pornography
For moral and ethical uprightness
Limit or prevent unsolicited messages from filtering through
Prevent piracy (illegal copying and duplication of information without
authorization)
Limit plagiarism by putting information in a format that cannot be easily
changed
Commercial benefits to promote copyright and property right.
Offers privacy/confidentiality
Preventing data alteration. Any 3x1= 3marks
(b) (i) Explaining the term data transmission media
These are communication lines or channels or path through which data is
transferred from device to another.
Or channels used in transferring data/information 02marks
(ii) Listing examples of data transmission media
Infra red light
Radio waves
Micro waves
Optical fiber cable
Twisted pair cable
Coaxial cable
Or wireless/unguided/unbounded technology
Cabled/guided/physical/tangible Any 3x1= 3marks
25. (a) Importance of features in word processing
(i) Footnote
Helps in providing explanatory/ or clarifying notes comments about a
concept or phrase used in a particular page of a document 02marks
(ii) Toggle case
It helps the user to hurriedly change or switch case of text to upper case or
lower case and vice versa. 02marks
(b) Distinction between cut and copy
To cut is to move data or text or word from its original place to a new
location/clipboard/buffer/ While
Copy is to create an extra or duplicate copy of the data or file.
(For both sides correct) 02marks
(c) What presentation software is
259
FINAL PAPER 2017
260
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Security levels required.
Type of business or organization/size
Ease of expansion in future
Technical advice and support Any 5x2= 10marks
(b) Explanation of limitations to full internet use in Uganda
Cost implication for the initial outlay and maintenance are so threatening
Government policy are not favorable e.g. taxes on IT equipment
Ignorance due to high illiteracy rates
Limited internet infrastructure/network coverage
Poverty levels are high
Fear for internet flaws e.g. pornography, network viruses and invasion of
privacy
Technological phobia
Natural calamities/causes like lightening, fires, obstacles e.g hills
Limited electric power supply
Digital divide
Nature and quality of some ISPs Any 5x2= 10marks
28. (a) Factors to consider before buying a computer
Needs/purpose of the school like different needs like curriculum, students,
teachers etc
Nature of the school e.g. a school for the deaf would need some
hardware for the deaf.
Ergonomics Safety provisions for the hardware e.g. comfort, safety,
efficiency etc
Cost of hardware components given the available school budget like
installation, initial hardware cost and maintenance plus repair.
After sale services provision such as free maintenance,
warrants/guarantees for a period of time like one year.
Source of hardware given the school foundation body and virtues
School and government policy governing procurement laws and
procedures.
Data/information security provisions/concerns
Computer hard disk
RAM capacity
Processor speed.
Compatibility with the existing infrastructure in the school
Provision for future growth and development (upgradeability)
Past experience of working state of the nature of the computer.
Reputation of the supplier
261
FINAL PAPER 2017
Environmental concerns
Technical advice and support
Space for storage
Consider the internal Network Interface Card
Consider Resolution for high Graphics
Mentioning 1 mark Explanation 1 mark Any 5x2= 10marks
(b) Ways of caring for computer hardware
Legislation/setting up working laws e.g. computer lab rules, ICT use
policy,
Code of conduct around computer use ranging from hardware movement,
installation etc
Burglar proofing
Regular servicing and maintenance
Servicing through professionals
Avoiding dust and water into hardware by use of dust and water proof
covers.
Education/sensitizing users about basic hardware care/practices
Electric power surge protectors/Proper electrical wiring/earthling
/insulation.
Bolting hardware on walls, tables and ground
Engage alarms systems e.g. smoke, fire detectors
Authentication systems like biometric, swipe cards, identity cards etc
Hardware audits on regular basis
Engraving/labeling hardware
Security guards to take an eye on the installations
Use of CCTV cameras for surveillance for feedback and evidence.
Installation of lightening arrestors
Keeping rooms under lock and key
Avoid exposure to direct sunlight and extreme temperatures.
Turning off the computer system when not in use.
Proper turning on/off the computer system
Mentioning 1 mark Explanation 1 mark Any 5x2= 10marks
29.Describing conditions that can lead to a computer system reboot
When an application or operating system freezes/hangs/ does not
respond
After installation of a new software (application or utility)
When a peripheral or hardware component has failed to function/work
During/After installation of operating system.
After changing use control settings(CMOS/BIOS settings)
262
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
When a user wants to clear a malicious infection like malware, spyware,
viruses that are in memory
After software update
After uninstalling software
After uninstalling hardware
After installing a new hardware
When the computer system slows down
When there is suspected system tapping
When a user wishes to switch from one operating system to another
(Multiple O.S)
After malware/virus scanning
When a deadlock occurs
Before Installing software
When application software fails to work
Mentioning 1 mark Explanation 1 mark Any 5x2= 10marks
263
EXAMINERS REPORT 2017
264
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Teachers should encourage the learners to read widely but not restrict
them to certain topics only.
Section B
Question 21 (a)
The question required candidates to define computer evolution. It was
popular.
Weaknesses of the Candidates
Many candidates confused the concepts of computer evolution with
computer generation.
Advice to the Teachers
Teachers are advised to clarify the difference between computer evolution
and computer generation and other seemingly related concepts.
Question 21 (b).
Candidates were required to fill in the correct options given in the question
paper. It was popular.
Weaknesses of the Candidates
Some candidates provided alternatives not given to them in the question
paper, yet others lacked knowledge about the terms given.
Advice to the Teachers
Teachers are encouraged to explain the different computer terminologies to
the learners.
Question 21 (c).
The question required candidates to demonstrate knowledge on how
computers are used in the;
(i). Health sector. It was popular.
Weaknesses of the candidates: Candidates gave general uses of
computers.
Advice to the Teachers
Teachers should discuss with learners the real uses and application of
computers in the various specialized areas.
(ii). Security sector. The question was popular.
Weaknesses of the Candidates
Some candidates considered security of a computer itself instead of how
computers can be used to enhance security.
Advice to the Teachers
Teachers are encouraged to emphasize specific roles of computers in the
various specialized sectors.
Question 22(a).
The question required candidates to define the term computer hardware.
The question was popular and well done.
265
EXAMINERS REPORT 2017
266
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Some candidates failed to use appropriate words to bring out the gist of the
required terms.
Majority of the candidates failed to relate a wild card in terms of database
use.
Advice to the Teachers
Teachers are encouraged to define all terms used in practical application
tasks for learners to easily integrate them to practical and theoretical use
and explanations.
Question 23 (a) (ii).
This question required candidates to demonstrate the use of wild card in a
query criterion. It was a popular question though majority of the candidates
had very little knowledge of the wild card application.
Advice to the Teachers
Teachers are encouraged to provide to learners the practical uses of
specific terms and features used in software application programs.
Question 23 (a) (iii).
The question required candidates to give the commonly used wild card
symbols / characters query criterion.
This question was popular but highly failed by majority of the candidates.
Weaknesses of Candidates
Candidates wrote wrong examples of wild card symbols. Candidates gave
general symbols that facilitate the manipulation of a wild card symbol like []
and “ !”
Advice to the Teachers
Teachers are encouraged to emphasize the difference between characters
that represent other characters in a query and general characters.
Question 23 (b)(i)
The question required candidates to state characteristics of labels when
placed in a spreadsheet by default. It was a popular question but also highly
failed by majority of the candidates.
Weakness of the Candidates
Candidates had limited knowledge about a label in relation to spreadsheet
cell application. Many candidates mistook labels for column headings.
Advice to Teachers
Teachers are encouraged to clearly define the different data types used in a
spreadsheet program.
Teachers are also advised to practically show students the difference
between a label and a value during the lesson.
Question 23(b) (ii)
267
EXAMINERS REPORT 2017
268
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
It required candidates to give the importance of some features in word
processing i.e. footnote and toggle case. Majority of the candidates
answered this part well.
Weaknesses of the Candidates: Some candidates mistook a footnote for
a footer.
Advice to the Teachers
Teachers are encouraged to continuously assess and help learners to
understand most of the features used in a word processor.
Question 25(b).
The question required candidates to give the difference between “cut” and
“copy” as used in word processing. The question was popular but poorly
done.
Weaknesses of the Candidates
Some candidates were instead confusing the two concepts with pasting.
Advice to the Teachers
Teachers are encouraged to handle word processing facilities while
allowing learners to see the difference while working.
Question 25(c).
This question required candidates to define a
presentation software program. The question was
popular and well attempted by majority of the
candidates.
Weaknesses of the Candidates
Many candidates failed to define what a presentation program is.
Advice to the Teachers
Teachers are encouraged to define concepts basing on “what they are” as
opposed to “what they do”. “What they do” can be done by very many other
concepts.
Question 26.
The question required candidates to explain the function of each of the
following: “termination” and “variable declaration” as used in programing,
The use of a compiler, explaining the term “device drivers” and giving forms
of computer interfaces provided by the operating system.
The question was poorly attempted by the majority of the candidates
Weaknesses of the Candidates
Most of the candidates lacked adequate knowledge of programming
concepts. Candidates mistook device drivers for hardware
Many candidates confused a program code statement with a program
itself.
Advice to the Teachers
269
EXAMINERS REPORT 2017
Teachers should always attempt to clearly explain the role and need for
every process in programming and other applications.
Section C
Question 27 (a).
The question required candidates to give factors considered when
choosing a LAN model. The question was not popular.
Weaknesses of the Candidates
Some candidates were instead giving advantages of LAN models, some
were giving factors to consider before buying computers.
Question approach and idea presentation was largely missing. Some
candidates were instead generally comparing a peer-to-peer and the client-
to-server model.
Advice to the Teachers
Teachers are encouraged to teach computer networking exhaustively to
allow learners apply the knowledge easily.
Question 27 (b).
Candidates were required to explain the limitations to full Internet use in
Uganda. The question was popular and fairly done.
Weaknesses of the Candidates
Some candidates were providing advantages and disadvantages of using
the Internet in Uganda.
Some candidates did not understand the question due to wrong question
interpretation.
Majority of the candidates did not explain their ideas satisfactorily, thus
leading to loss of marks.
Advice to the Teachers
Teachers are encouraged to train their learners in better essay writing skills.
Proper language and presentation skills need to be emphasized more in
schools.
Principles of essay writing MUST be promoted in schools across all
subjects. A good essay is assumed to have - points stated in paragraphs,
explained, with an example where applicable.
However, all these three items must be connected to the question.
Question 28 (a).
Candidates were required to describe the factors to consider before buying
a computer. It was a popular question and well done by majority of the
candidates.
Weaknesses of the Candidates
Some candidates were giving characteristics of modern computers.
Other candidates were giving answers for part (b) of the question.
Some other candidates were giving Internet related points.
270
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Majority of the candidates showed very little content acquisition.
Advice to the Teachers
Teachers are encouraged to exhaust all the subject content to the benefit of
the learners.
Question 28 (b).
Candidates were required to explain the ways of caring for
computer hardware parts. The question was popular and well
done by majority of the candidates.
Weaknesses of the Candidates
Many candidates were just giving schools’ rules and regulations governing
computer laboratory use.
Most of the points presented by the candidates were related to dust control.
Candidates were not showing the ‘how’ and ‘why’ parts in relation to
hardware care.
Many candidates could not differentiate “care for hardware” from “care for
digital content”
Advice to the Teachers
Teachers should clearly bring out well “care for hardware” differently from
“care for digital content”.
Teachers are encouraged to clearly give the difference between computer
hardware maintenance and computer laboratory care when explaining to
the learners.
Question 29.
Candidates were required to describe the conditions that would necessitate
a computer system reboot. The question was not popular.
Weaknesses of the Candidates
Some candidates were giving the points but failed to explain them.
Some candidates showed lack of subject content regarding computer
system start-up.
Advice to the Teachers
System start-up and configuration is one of a very practical and new topic in
our curriculum. Teachers are encouraged to handle it well.
840/2 COMPUTER STUDIES (PRACTICAL)
The paper consisted of two sections, A and B. Section A contained one
compulsory question drawn from Word processing and Spreadsheets.
Section B contained three (03) questions drawn from Database, Web-
designing and Computer Presentations. The candidates were to answer
any two questions from this section.
271
EXAMINERS REPORT 2017
The paper was of the same level of difficulty as that of the previous year,
2016. The candidates of UCE 2017 performed poorer than those of the
previous year.
Question Analysis
Section A
Question 1 (a) Word Processing
Candidates were asked to demonstrate skills in font/paragraph/page
formatting and footnote referencing in word processing.
It was a popular question.
Weakness of Candidates: Candidates could not ably use the footnote
feature.
Advice to Teachers:
Teachers should cover all the Word processing features including
referencing features.
Question 1(b) Spreadsheets
Candidates were asked to show the application of formulae, functions, and
charts in manipulation of data.
Popularity of the question: popular
Weakness of Candidates: Candidates had difficulties with the correct
calculations of net pay.
Advice to Teachers: Teachers should emphasize proper usage of
formulae
SECTION B
Question 2. Web-designing
Required candidates to design a two-page website including a form for
entering data. It was unpopular.
Weakness of Candidates:
Candidates could not easily design a form with form features like radio
buttons, dropdown menus, etc.
Advice to Teachers:
Teachers should expose learners to a variety of web authoring programs
not limiting learners to only MS-Publisher.
Question 3. Presentation
Candidates were asked to prepare a five page-slide presentation with a
hierarchy chart. It further required candidates to apply animations and
transitions.
Popularity of the question; very popular.
Weakness of Candidates:
Candidates had difficulties in producing the correct chart, linking slides and
stating the appropriate data.
Advice to Teachers:
272
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Teachers should expose learners to a variety of presentations. They
should also give learners a variety of tasks/ exercise to enable them explore
the application in depth.
Question 4. Database Management System
Required candidates to design a data-base; enter data in the database
using a form and retrieve data using queries. They were also required to
assign appropriate data types.
Popularity of the question. It was popular.
Weakness of Candidates
Use of appropriate data types
Formatting currency with a UGX symbol
Use of appropriate formulas in a form
Use of appropriate criteria.
Advice to Teachers:
Emphasis should be put on data types
Formatting and customization of values in databases
Proper use of criteria in queries.
273
FINAL PAPER 2018
1. C 7. B 14. D
2. D 8. A 15. D
3. C 9. C 16. C
4. A 10. B 17. A
5. D 11. A 18. B
6. A 12. B 19. D
13. B 20. C
SECTION B: STRUCTURED
21. (a) A computer is an electronic device which accepts, processes,
stores and outputs data/information
Or.
An electronic device that manipulates data.
Or.
An electronic device with hardware and software.
Or.
An electronic device with a monitor, system unit, printer, keyboard,
mouse, etc.
Or.
An electronic device which accepts data & output information.
Or.
It’s a programmable machine/device.
(b) (i) - Enter key.
- Return key
- Arrow key
- Tab key
Any 1 x 1 = 1 mark
(ii) - Caps lock key
1 mark
(iii) - Backspace key
1 mark
(c) Contributions of computers in teaching and learning
Computer aided research
Computer aided teaching and learning/distance learning
Computer aided assessment for grading and positioning of
learners
Computer aided academic planning for timetabling, scheming,
lesson planning, drawing of academic budgets, etc
274
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Edutainment
Storage of academic records
Monitoring students and teachers attendance and academic
programs
Creation of visual learning aids
o Loss of productive academic time in playing computer games
o Loss of educational materials
o Promotion of examination malpractices
Any 2 x 1 = 2 marks
(d) (i) Tasks done by a computer programmer
Create software/designs programs/writing codes/coding
Debug
Test programs
Upgrade programs
Educate and advise on which program to use
Install /uninstall/implements programs
Program consultancy
Writing program manuals(documentation)
Any 1 x 1 = 1 mark
275
FINAL PAPER 2018
276
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Any 3 x 1 = 3 marks
(d) Reasons why a computer may be restarted
To clear a malware from memory/check for a virus
To configure new software settings such that they interact
well with the operating system
To enable the system to recognize new hardware
specifications/settings after installation
Refresh the system
To enable a hanging program to reorganize itself for a task
Any 1 x 1 = 1 mark
277
FINAL PAPER 2018
278
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
279
FINAL PAPER 2018
Any 2 x 1 = 2 marks
(iii) Factors to consider before buying application software
Upgradeability o self-help menu
Purpose o Accuracy/efficiency (how fast
Security/safety provisions the sw is)
Free bugs/errors o After sales service (delivery,
Flexibility install)
o Cost of the application o Storage space (portability)
program o reliability
o Compatibility o Past experience of the app.
o easy to learn sw
o documentation o Nature of organisation
Any 2 x 1 = 2 marks
(b) Define the terms given in relation to computer programming
(i) Source code
A collection of computer instructions (possibly with
comments) written using some human readable
and usable language such as text.
A collection of computer instructions ready for
compiling and are written in text format.
280
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Is a raw form (not yet changed into machine
readable format) of a computer program in text
form.
Any 1 x 2 = 2 marks
(ii) Keyword
A word that is reserved by the program because it has a
special meaning/purpose.
2 marks
SECTION C
27. Specification to consider when buying a laptop computer
CPU specifications e.g type and speed
Provisions for a local disc and local disk specifications e.g type,
disc space
RAM size or capacity
The brand
Generation
Nature of operating system
Networking capabilities
Nature of the monitor and specifications (Size, touch capability,
VGA card specifications)
Nature and number of ports
Provision and number of pointing devices
Laptop color
Provision for data capture
Laptop size
o Removable drives/storage capabilities
o Battery life
o Documentation
o Safety and security
Any 5 x 4 = 20 marks
Mentioning a specification = 2 marks
Relevant Explanation = 2 marks
Total = 4 marks per specification
28. Sketch and explanation of network layouts
Bus or linear topology
A topology in which each node is connected in series along a
single conduit or main cable called a bus.
A sketch diagram of a bus topology
281
FINAL PAPER 2018
Print
er
Terminator
Backbone Workstation
cable
Star topology
A topology in which all the nodes are connected to a central hub.
Each node has an equal right of transmission of data.
A sketch diagram of a star topology
Printer
Workstation
Hub/Concentrator/Server/Switch
Ring Layout/topology
A ring topology is a network layout in which each node has
exactly two neighbours connected to it for communication
purposes. For each node to communicate, it must make a request
for a token be able to send a signal along the path.
A sketch diagram of a ring topology
Cable Workstation
282
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
Cable
Any 4 x 5 = 20 marks
Mentioning = 1 mark
Workstation Sketch diagram = 1 mark
Labeling = 1 mark
Explanation = 2 marks
Total = 5 marks per topology
283
FINAL PAPER 2018
29. (a) Reasons for using a flowchart other than a pseudo code for
solving a problem
A flowchart is easy to interpret and understand
A flowchart provides a better/easier understanding of the
problem processing logic
Flowcharts provide more detail yet readable structure of
analyzing a problem.
Are more capable of showing the overflow of instructions or
data from one process to another.
One can easily conceptualize the whole program at just a
glance from a flowchart.
A flowchart provides an easier way of error identification and
rectification. They offer/give more efficient program
maintenance as they give the programmer which part of the
program logic to put emphasis on and can be edited to suite
new changes.
With flowcharts information needs or problems are analyzed
in a more effective way that reduces costs and time wastage
o Makes results look attractive and organized
Any 3 x 2 = 06 marks
(b) AN ALGORITHM /A PSEUDO CODE TO PROMOTE, MAKE
REPEAT OR DISMISS A STUDENT 1 mark
284
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
285
EXTRA OBJECTIVES COMPILATION ONE
287
EXTRA OBJECTIVES COMPILATION ONE
B. Project report
C. Students records directory
D. Graphics imaging
Refer to this spreadsheet and chart to answer the questions that follow
A B C D
1 Unit price: $5.00
2
3 SALES Units Total
4 Week 1 4 $20.00
5 Week 2 2 $10.00
6 Week 3 3 $15.00
7
8 Total 9 $45.00
289
EXTRA OBJECTIVES COMPILATION ONE
291
EXTRA OBJECTIVES COMPILATION ONE
43. Cell B1 contains a formula =A$1*10. If the fill handle is used to copy the
formula to cells C2, and D1 the results will be:
A. 800 in C2 and 200 in D1
B. 1000 in C2 and 1000 in D1 different values.
C. 80 in C2 and 20 in D1
D. 1000 in C2 and 20 in D1
44. Cell A7 contains a formula for finding the average of the data in column
A. Which of the following formulae would display the result needed?
A. = MEAN (A1:A6)
B. = COUNT (A1:A6)/6
C. =(A1+A2+A3+A4+A5+A6)/6
A1 A2 A3 A4 A5 A6
D.
COUNT(A1: A6)
45. Which of the following is true about an absolute reference in a
spreadsheet?
A. It can only be used on individual cells but not on ranges.
B. The spreadsheet does recalculation every time it is used.
C. The reference cell changes when you copy within a worksheet.
D. The reference cell stays the same no matter where you copy it to within
the worksheet
292
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
46. Which of the following relationships best shows the way the user relates
to the parts of a computer system?
A. User → operating system → application → hardware.
B. User → application → operating system → hardware.
C. User → application → hardware → operating system.
D. User → hardware → application → operating system.
47. Which one of the following Operating Systems does not have a GUI?
A. Windows 8
B. DOS
C. Mac OS X Leopard
D. Linux
48. Direct sunlight can cause damage to floppy disks. This is because the
A. disks are always warm.
B. light intensity is too high for the disk.
C. high humidity lets fungi grow on the disk surface.
D. high temperature causes bending of the disk surface.
49. Copyright regulations don’t apply to
A. Freeware and Open source software
B. Shareware and web based software
C. Open source and Public domain software
D. Public domain software and Off the shelf software
50. A printer should be connected to which port?
A. RS-232
B. Parallel
C. Serial
D. Video
51. A relative living overseas sends you a computer. What should you
check before plugging in the power lead?
A. That the voltage is set correctly for your country.
B. That the Operating System is the right one for the computer.
C. That there is no pirated software on the hard drive.
D. That the computer has sufficient RAM memory to run the software you
want to use.
52. Which file attribute will protect a file from being written to?
A. Read-only
B. Write Only
C. Hidden
D. System
53. Susan has an Office Suite on her computer. It allows her to put
spreadsheet tables into her word processor document. This Office Suite
is an example of
293
EXTRA OBJECTIVES COMPILATION ONE
A. integrated software.
B. proprietary software.
C. a programming language.
D. an operating system
Hello everyone,
Rogers
54. In the memo above, what is the text alignment in the main paragraph?
A. Right
B. Left
C. Center
D. Justify
55. What font formatting was given to the name “Rogers”?
A. Bold
B. Italics
C. Bold and Italics
D. Normal
56. A computer takes time to boot. During this time the computer is
A. loading the operating system.
B. loading all of the applications.
C. letting the processor warm up properly.
D. making sure the voltage gets to the right level.
57. The operating system does different tasks. One of these tasks is to
A. let a user move files on the computer.
B. act as a word processor.
C. browse the internet.
D. be a calculator.
58. A sequence of coded instructions which the computer interprets is a
A. microprocessor.
B. connection.
294
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
C. program.
D. monitor.
59. Which operating system function would you use to find a lost file?
A. Search
B. Sort
C. Recover
D. Copy
Use this spreadsheet to answer questions that follow:
295
EXTRA OBJECTIVES COMPILATION ONE
63. Which error message will excel show if text in a function syntax is not
recognized?
A. #DIV/0!
B. #REF!
C. #NUM!
D. #NAME?
64. Which of the following devices must be used in order to connect two computers
for sharing of data?
A. USB
B. NIC
C. UPS
D. Microwave
65. A document with copyrighted material is marked with
A. ©.
B. ®.
C. €.
D. @.
66. Which of the following is NOT a management task carried out by the Operating
System?
A. Processor Management
B. Memory Management
C. Device Management
D. User Management
67. The filename “ebola.pdf” tells you that the information in the file is about ebola
and the file is
A. a Word file.
B. an Acrobat file.
C. a Database file.
D. a PowerPoint file.
68. The first operation to move a paragraph from one place to another is
A. clicking on Edit Menu and selecting COPY.
B. highlighting the paragraph to be moved.
C. right-clicking and selecting COPY.
D. right-clicking and selecting CUT.
69. Which of the following is both an input and an output device?
A. keyboard
B. monitor
C. disk drive
D. printer
296
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
70. In the figure above, the statement (5R x 2C) shown in the name box of the
Microsoft Excel worksheet means
A. it is a formula for multiplying the value in cell 5R with that in cell 2C.
B. there are 5 rows and 2 columns being highlighted in this worksheet.
C. the cursor is located at the intersection of Row 5 and Column 2.
D. That 5Rx2C is the active cell.
71. How is Christopher Latham Sholes remembered in the history of computers?
A. He invented the ENIAC
B. He was the first debugger
C. He invented the QWERTY keyboard
D. He invented the mouse during the 4th generation.
72. A hardware or software system used to restrict access to data and information on
a network is called
A. modem.
B. netscape.
C. ARPANET.
D. firewall.
73. The system clock
A. is a storage device.
B. shows the time and date.
C. determines data process speeds.
D. turns off the computer after a long time.
74. The following are parts of the Central Processing Unit (CPU) except
A. ALU.
B. Control Unit.
C. ROM.
D. registers.
75. In computer studies and information technology, a bug is a
297
EXTRA OBJECTIVES COMPILATION ONE
299
EXTRA OBJECTIVES COMPILATION ONE
91. The first commercially available computer developed in the year 1951 was
________ .
A. ASCC.
B. UNIVAC.
C. ENIAC.
D. EDVAC.
92. A Samsung galaxy is an example of a ________ computer.
A. Tablet PC.
B. Laptop.
C. Notebook.
D. Desktop.
93. The original ASCII code used…bits of each byte, reserving the last bit for error
checking
A. 5
B. 6
C. 7
D. 8
94. Who is credited with the idea of using punched cards to control patterns of a
weaving machine?
A. Pascal
B. Hollerith
C. Babbage
D. Jacquard
95. Twisted pair, coaxial cable and fiber optic cable are types of transmission
A. Chains
B. Media
C. Data
D. Information.
96. Why is UTP cable the recommended for use in computer laboratory networks?
A. It covers longer distances
B. It is easier to install and use
C. There is No signal interference
D. All the above
97. The following resources that can be shared by computers on a network except
A. Peripheral Devices like the Keyboard
B. A single Internet Connection
C. Processing Power
D. IP Addresses
98. Which of the following is NOT a characteristic of fourth generation computers?
A. Operating systems based on the Graphical User Interface (GUI) were developed.
B. Multi-tasking was possible.
C. They had Artificial Intelligence.
D. Computers could be linked together to form networks.
300
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
99. Which of the following was a development during the mechanical era (1623 –
1945)?
A. Napier’s Bones.
B. Blaise Pascal's Calculator
C. William Oughtred’s Slide rule
D. Vacuum tubes.
100. Which of the following programs are NOT typically included in Microsoft
Office Suite?
A. Word Processing Programs
B. Desktop Publishing Programs
C. Email Management Programs
D. Video Editing Programs
1.A………. also called an allocation unit, consists of two to eight sectors of space
used to store data on a hard disk.
E. Disk Drive.
F. Cluster.
G. Cylinder.
H. Platter.
2.Which of the following is the main reason why USB ports are becoming more
popular than other types?
E. Because USB ports make it easier to connect external devices to PCs.
F. Because USB ports allow attaching a multitude of connectors at the back of
PCs.
G. Because USB ports permit high-speed device interface data transfer rates.
H. Because USB ports support universal plug and play.
3.Which of the following is the parallel port, which allows several bits to be
transmitted simultaneously; and commonly provides the interface for such devices
as high-speed printers?
301
EXTRA OBJECTIVES COMPILATION TWO
11. Which of the following was not a development during the mechanical era (1642
– 1890)?
E. Blaise Pascal's Calculator
F. William Oughtred’s Slide rule
G. Leibniz’s Stepped Reckoner
H. Jacquard’s Loom
12. Into which port would you plug the monitor cable connector?
A. –
B. –
C. –
D. –
13. Which type of computer memory is not a form of
permanent storage?
A. ROM
B. RAM
C. Floppy Disk
D. Hard Disk
14. It is not possible to save a file to a
A. Hard Disk.
303
EXTRA OBJECTIVES COMPILATION TWO
B. Floppy Disk.
C. CD-ROM.
D. Magnetic Tape.
15. What does the Central Processing Unit (CPU) actually process?
A. Bits and bytes
B. ASCII
C. Applications
D. Device drivers
16. In most applications, the command Save is found on which pull down menu?
A. File
B. Edit
C. Format
D. Help
17. A file is located at
C:\My Documents\Business\Accounts.xls
Which part of this path is a subfolder (subdirectory)?
A. C:\
B. Business
C. My Documents
D. .xls
18. The hardware where data is actually written and stored is called a storage
A. device.
B. medium.
C. memory.
D. processor.
19. Imaging devices are categorized as
A. input.
B. output.
C. storage.
D. processing.
20. Keys F1 through F12 are known as ….keys.
A. fast
B. control
C. function
D. shift
21. Businesses that use carbon invoices prefer ……… printers.
A. laser
B. inkjet
C. desk jet
D. dot matrix
22. 01001101 binary is
A. 129
B. one byte.
304
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
C. 76 decimal.
D. 4D hexadecimal.
23. With reference to the diagram below, how many files are found in the active
folder?
.
A. 14
B. 22
C. 8
D. 9
24. To copy an image of only the current application’s window to the clipboard,
press
A. F1
B. Alt- Print Screen
C. Scroll Lock
D. Print Screen
25. Which is not usually an environmental danger for computers?
A. Extreme darkness
B. Magnetic field
C. Water and light
D. Dust and heat
26. Which of these acronyms is a programming language?
A. WYSIWYG
B. BASIC
C. ASCII
D. BIOS
27. What is the best definition of a computer program?
A. One part of the Internet
B. Something made by Microsoft
C. A sequence of coded instructions
305
EXTRA OBJECTIVES COMPILATION TWO
307
EXTRA OBJECTIVES COMPILATION TWO
A. ROM
B. RAM
C. Hard disk
D. Floppy disk
44. A scanner is an example of
A. an output device.
B. an input device.
C. a device driver.
D. a tape drive.
45. Which device helps a computer to continue operating after a power failure?
A. CPU
B. DOS
C. UPS
D. USB
46. Which row shows how Hard Disks and Compact Disks store data?
Hard Disks Compact Disks
A. Magnetic Electric
B. Optic Optic
C. Electric Magnetic
D. Magnetic Optic
47. Which of the following types of printers does not use a print-head mechanism
when printing characters?
A. Line printers
B. Dot Matrix printers
C. Daisywheel printers
D. Laser printers
48. Optical Disks used in computers are usually made of
A. Zinc.
B. Silicon.
C. Chromium.
D. Lacquer.
49. The process of initializing a disk to be ready for data storage is called Disk
………
A. Formatting.
B. Initiation.
C. Scanning.
D. Defragmenting.
50. According to the picture below, which of the following information is true?
308
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
311
EXTRA OBJECTIVES COMPILATION TWO
312
UCE COMPUTER STUDIES REVISION Q&A FOR UGANDA
ANSWER TABLE FOR EXTRA OBJECTIVE COMPILATION ONE
1 C 11 D 21 D 31 C 41 D 51 A 61 C 71 C 81 A 91 B
2 B 12 D 22 D 32 A 42 C 52 A 62 D 72 D 82 B 92 A
3 B 13 B 23 A 33 A 43 D 53 A 63 D 73 C 83 C 93 C
4 C 14 A 24 B 34 D 44 C 54 D 64 B 74 C 84 C 94 D
5 C 15 B 25 A 35 B 45 D 55 B 65 A 75 B 85 A 95 B
6 C 16 C 26 C 36 A 46 B 56 A 66 D 76 A 86 D 96 B
7 B 17 C 27 A 37 A 47 B 57 A 67 B 77 B 87 C 97 D
8 B 18 D 28 A 38 C 48 D 58 C 68 B 78 D 88 D 98 C
9 A 19 A 29 A 39 B 49 C 59 A 69 C 79 C 89 C 99 B
10 C 20 A 30 C 40 A 50 B 60 C 70 B 80 C 90 D 100 D
313
EXTRA OBJECTIVES COMPILATION TWO
SHAREBILITY UGANDA
RESOURCE POOL
Available online at
sharebility.mukalele.net
Success in your Exams!
END
314