0% found this document useful (0 votes)
70 views3 pages

COSC 103 Exam

The document is an examination paper for COSC 103: Introduction to Computer Applications at Chuka University, intended for second-year Bachelor of Science in Computer Science students. It includes various questions covering topics such as computer viruses, network types, software applications, and file management, with a total of five questions to choose from. Students are required to answer question one and any two additional questions within a two-hour time frame.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views3 pages

COSC 103 Exam

The document is an examination paper for COSC 103: Introduction to Computer Applications at Chuka University, intended for second-year Bachelor of Science in Computer Science students. It includes various questions covering topics such as computer viruses, network types, software applications, and file management, with a total of five questions to choose from. Students are required to answer question one and any two additional questions within a two-hour time frame.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

COSC 103

CHUKA UNIVERSITY

UNIVERSITY EXAMINATIONS

SECOND YEAR EXAMINATION FOR THE AWARD OF DEGREE


OF BACHELOR OF SCIENCE IN COMPUTER SCIENCE

COSC 103: INTRODUCTION TO COMPUTER APPLICATIONS

STREAMS: BSC (COMP. SCI) Y2S2 TIME: 2 HOURS

DAY/DATE: WEDNESDAY 17/4/2019 11.30 A.M. – 1.30 P.M.


INSTRUCTIONS: ANSWER QUESTION ONE AND ANY OTHER TWO
QUESTIONS.

Question One (30 marks)

(a) Explain two types of computer viruses. (2 marks)

(b) Explain the following terms: (4 marks)


(i) Bit
(ii) Processor
(iii) Computer network
(iv) Word processor application
(c) Differentiate between the following: (4 marks)
(i) Star network topology and bus network topology
(ii) Operating System software and spreadsheet software
(d) Explain what footer in word document is. Briefly detail the procedure of inserting footer
in a word document. (4 marks)

(e) Suppose you are given a storage space of a totaling to 8 GB. How much space will remain
unutilized after storing 10 files of approximately 512 MB each? (4 marks)

(f) Given that organizations are digitizing their service delivery processes, explain two
measures you would advise clients on online services requests and delivery. (4 marks)

Page 1 of 3
COSC 103

(g) Use the excel sheet shown below to answer the following questions:

(i) Write the formula to compute total score for Jacque Boid. (2 marks)
(ii) Write the function to compute average score for COSC 102. (2 marks)
(iii) Write the function to compute the lowest score in COSC 103. (2 marks)

(h) Briefly, outline the procedure of saving an open word document in the folder
“Assignments” that is a sub-folder in the “COMP 101 tasks” folder in Local Disk D:
(3 marks)
(i) Perform the following operation (show your working)
Convert 111001.1112 to Octal (3 marks)

Question Two (20 marks)

(a) Discuss the following types of computer networks. (6 marks)


(i) LAN
(ii) WAN
(iii) Internet

(b) Discuss six indicators of a virus infected computer. (6 marks)

(c) Explain the relevance of communications protocol in computer networks. State the
main communications protocol and discuss its use. (4 marks)

(d) The Jubilee government rolled a service delivery platform dubbed “huduma center”.
Discuss how network capability has influenced this service. (4 marks)

Page 2 of 3
COSC 103

Question Three (20 marks)

(a) Computing knowledge is relevant in almost every area of life today. With a view point
of a learning institution, justify this statement. (8 marks)

(b) Communication media is categorized as either wired or wireless. Explain the difference
between the two and give two examples of each. (6 marks)

(c) Discuss three steps (in order) you would take to if you suspect your desktop computer is
infected by a computer virus. (6 marks)

Question Four (20 marks)

(a) Every computer system has special software the “operating system software”. Explain
four reasons why this software is critical for every computer system. (8 marks)

(b) Perform the following number conversions.

(i) 457.2510 to binary (3 marks)


(ii) 110011101.0112 to Hexadecimal (3 marks)

(c) Explain the role of the following keyboard shortcuts in Microsoft Windows. (6 marks)

(i) ALT + F4
(ii) ALT + TAB
(iii) CTRL + Z
(iv) CTRL + Y
(v) CTRL + S
(vi) CTRL + V

Question Five (20 marks)

(a) Computer users interact with applications software to perform desired tasks. When
acquiring these applications software, explain four considerations they may take into
account. (8 marks)

(b) Passwords are critical in the current online community.


(i) Explain the role of the password (2 marks)
(ii) Discuss three measures of securing a password (6 marks)

(c) Discuss the concept of file management in a computer system. (4 marks)

----------------------------------------------------------------------------------------------------------------

Page 3 of 3

You might also like