Computer Science Tutorial Sheet 1
Computer Science Tutorial Sheet 1
Computer Science Tutorial Sheet 1
INSTRUCTIONS
c) Standards are important for a number of reasons, describe any two (2). (4 marks)
d) There are at least five (5) documents which are an essential part of user documentation. Name
any three (3) and describe what they contain. (6 marks)
f) Documentation of a software project is organized into several categories. List any two (2).
(2 marks)
QUESTION TWO
(i) ________________________________________
(ii) ________________________________________
b) Give 2 examples of devices that are used to produce each type of output. (2 marks)
Type 1:
(i) _____________________________________
(ii) _____________________________________
Type 2:
(iii) _____________________________________
(iv) _____________________________________
c) Different kinds of printers are available for different applications. Printers are classified into
two categories- impact and non-impact printers. Give two examples of each. (2 marks)
d) An image on the monitor is created by configuration of dots, also known as __________. The
clarity of the image on the computer screen depends on three factors. These are
_______________________________________, ____________________________ and
__________________________________. (2 marks)
2
e) Name two applications where plotters are commonly used. (1 mark)
(iii) ______________________________________________
(iv) ______________________________________________
h) The Central Processing Unit sends data, instructions and information to the components inside
the computer as well as to the peripherals and devices attached to it. For this purpose, buses
are used. Name the three (3) buses that make up the system bus. (3 marks)
3
QUESTION THREE
iii. Cobol:
v. Assembly language:
c) System utility software is required for the maintenance of a computer. List any three (3)
system utilities. (3 marks)
d) Discuss any three (3) hazards to computer operator health and efficiency. (6 marks)
4
QUESTION FOUR
b) A method devised to help detect transcription and transposition errors is called the Check
digit method. Use the Modulus 11 check digit method to compute a check digit that would
be added to a five-digit personal identification number (PIN), 32416, to validate it.
(5 marks)
d) Viruses harm the computer in many ways, list any four: (2 marks)
f) An online system can offer three (3) major functions, what are these? (3 marks)
QUESTION FIVE
5
QUESTION SIX
a) Computer security focuses on three (3) aspects. These aspects are attacks, services and
mechanisms. For each of the following, state the aspect of computer security under which
it falls. (5 marks)
i. Martha listens in on Mary and Adam’s conversation.
ii. Agnes is assured that only Lisa will receive the message she sent.
iii. The company formulates a security policy.
iv. Stella is denied access to Steve’s facebook account.
v. An intrusion detection system is installed to detect intruders.