0% found this document useful (0 votes)
16 views438 pages

A-Level Ict Final

The document outlines the A'Level ICT syllabus, covering topics such as computer introduction, hardware, software, word processing, presentations, networking, spreadsheets, web designing, databases, programming, and computing trends. It details the evolution of computers through five generations, highlighting their characteristics and functions, including input, processing, storage, and output. Additionally, it discusses the various applications of computers across different fields such as education, business, healthcare, and communication.

Uploaded by

allanzaid48
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views438 pages

A-Level Ict Final

The document outlines the A'Level ICT syllabus, covering topics such as computer introduction, hardware, software, word processing, presentations, networking, spreadsheets, web designing, databases, programming, and computing trends. It details the evolution of computers through five generations, highlighting their characteristics and functions, including input, processing, storage, and output. Additionally, it discusses the various applications of computers across different fields such as education, business, healthcare, and communication.

Uploaded by

allanzaid48
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 438

ICT: A’LEVEL SYLLABUS

TEACHING SEQUENCE

TOPIC 1 – 2: INTRODUCTION TO COMPUTER


o Evolution and history of computer
o Uses and functions of computers
o Computer care and safety
o Classification of computers
o Computer system

TOPIC 2: Computer hardware


o Categories of computer hardware
o Application of different hardware components

TOPIC 3: COMPUTER SOFTWARE


o Introduction to software
o System software
o Application software

TOPIC 4: WORD PROCESSING


o Introduction to Word processing
o Microsoft word

TOPIC 5: COMPUTER PRESENTATION


o Introduction to presentation software
o Microsoft Power Point

TOPIC 6: SYSTEM STARTUP AND CONFIGURATION


o Computer booting process
o System configuration
o Software installation
o Computer trouble shooting

TOPIC 7: COMPUTER COMMUNICATION AND NETWORKING


o Introduction to Networking
o Networking

TOPIC 8: SPREADSHEETS
o Introduction to Spreadsheets
o Microsoft Excel

TOPIC 9: WEB DESIGNING


o Introduction to web designing
o Web design
TOPIC 10: DATABASES
o Introduction to databases
o Database design

TOPIC 11: ELEMENTARY COMPUTER PROGRAMMING


o Introduction to programming
o Developing a simple program
TOPIC 12: TRENDS OF COMPUTING
o Computer integrity and security
o Computer ethics
o Computers and society
o Emerging technologies
o Systems analysis
o Computer professions
CHAPTER ONE
INTRODUCTION TO ICT
o Evolution and history of computer
o Uses and functions of computers
o Computer care and safety
o Classification of computers
o Computer system

A COMPUTER
A computer is a general purpose electronic machine that receives/accepts, processes stores, and output data
into meaningful information.
OR A computer is an electronic machine capable of storing vast amount of data and carry out data processing
extremely fast. A Computer is a programmable machine.
The two principle characteristics of a computer are: ▪ It responds to a specific set of instructions in a well-
defined manner. ▪
It can execute a pre-recorded list of instructions (a program). Modern computers are electronic and digital.
The actual machinery which includes wires, transistors and circuits is called hardware while the instructions
and data are called software.
A Computer is an electronic device or programmable machine, operating under the control of instructions
(software) stored in its own memory unit that can accept data (input), manipulate data (process), and produce
information (output) from the processing.
Generally, the term is used to describe a collection of devices that function together as a system.
Alternatively, a computer is a programmable device that is capable of allowing input, processing, storing and
outputting of information at a very great speed.
In very simple terms, computers are machines that process data (or information) and supply results. The
operational speed of a computer is measured in millions of instructions per second (MIPS) .

EVOLUTION OF COMPUTERS
Evolution is the gradual development of computers in terms of technology and physical size from
the 1st generation to the present generation.
COMPUTER GENERATION

Computer generation refers to the state of improvement in the development and advancement of
computer technology over years.
OR
Is series of development in technology of computers year after year.
FIRST GENERATION [1944- 1958]

In earliest general purpose computer, most input and output devices were punched cards and
magnetic tapes. They were mainly made up of loops of vacuum tubes and magnetic drum. They
could run only one program at a time.

Examples of first generation computers are;

ENIAC - Electronic Numeric integrator and calculator.


EDISAC - Electronic Delay Storage Automatic Computer
UNIVAC - Universal Automatic Computer This was used by USA bureau of census from 1953.

Characteristics of First Generation Computers

1. They used vacuum tubes as their active element for internal operations.
2. They were large in size that is they could fill several rooms.
3. They were slow and could run one program at time.
4. They used punched cards and magnetic tapes to input and output data.
5. They used a great quantity of electricity and generated a lot of heat.
6. Programming was done in machine and assembler language.
7. They could not store much information i.e. they had limited primary memory.
8. They were expensive and terminals could be rented.

SECOND GENERATION [1959-1963]

By early 1960‘s, computers were improved instead of using vacuum tubes they used transistors which
were much smaller than vacuum tubes therefore they reduced in size.
Characteristics of Second Generation Computers

1. They used transistors as their active element.


2. They were smaller in size than first generation computers.
3. They used less electricity and generated less heat.
4. They became less expensive than first generation computers.
5. They were speedy and reliable since used removable magnetic disc packs as their storage devices
6. They led to introduction of high programming language e.g. FORTRAN [formula translation], COBOL
[Common Business Oriented Language]
7. They led introduction of super computers e.g. Livermore Atomic Research Computer [LARC]
THE THIRD GENERATION [1964-1970]

In the third generation, the integrated circuits *I.Cs‘+ replaced the transistors which are small
electronic components. The IC is so effective because its components do not need to be wired
directly to computer system board. Magnetic discs were used for secondary storage and computers
began to support multi programming and time storing.

Characteristics of Third Generation Computers

1. They used integrated circuit IC as their active element


2. They are smaller than second generation computers in size
3. They have low power consumption
4. They supported capabilities such as multi programming and time storing.
5. They were fast and use parallel processing.
6. They led to introduction of simpler programming language e.g BASIC [Beginners All Purpose Symbolic
Instruction Code]
7. They led to introduction of networking of computers.
FOURTH GENERATION

The fourth generation, Large Scale Integrated Circuits [LSIC] and Very Large Scale Integrated
Circuit [VLSIC] were developed whereby a special IC can contain a loop of up to 10,000,000 of
transistors. In 1971 Ted Hoff of Intel Company developed a micro processor which acted as CPU
(Central Processing Unit).

Characteristics of fourth generation

1. They use micro processors as their active elements e.g. 386, 486 Pentium 1,2,3,4
2. They are small in size since were made by using LSIC and VLSIC
3. They are fast and reliable.
4. They have a high primary memory.
5. They led to introduction of wide variety of software e.g. windows, Jet audio e.t.c.
6. They led to the development of inter computer communication e.g. internet (is a global system of
interconnected computer networks)
7. The price of computers dropped considerably and affordable
FIFTH GENERATION

The fifth generation is under development whereby, they will be using very large scale micro
processor circuits in a parallel architecture and highly sophisticated operating system. In this
generation, it is believed that computer will be sophisticated to extent that it may be possible to talk
to it in a human like manner.
Computers are becoming increasingly smaller, more powerful and less expensive.

USES AND FUNCTIONS OF A COMPUTER


The basic functions of computer
Basically, there are four functions, input, processing, storage and output.
(i) Input: computers making inputting any data such as words, articles relatively easy. Examples of input
devices include keyboard, computer mouse, microphones, and scanners e.tc.
(ii) Processing: computer can rapidly solve all types of numerical problems. Solving numerical problems
can be considered as an example of computer processing. Computers are accurate and error free, the can
huge amount of information at the same time.
(iii) Storage: computers have a high storage capacity and are able to store all types of information and
graphics & retrieved when needed. Examples of computer storage include hard disk, CD-ROM, DVD-
ROM and others.
(iv) Output: computers can produce output in different formats. For example soft copy and hard copy
outputs

Uses of computers in the society


Today, computers are widely used or employed in a number of fields for example:
(i) Research field
(ii) Business field
(iii) Education field
(iv) Military field
(v) Medical field
(vi) Transport/Airport field
(vii) Offices
(viii) Communication industry
(ix) Security field
(x) Banking industry
(xi) Homes
(xii) Recreation/ leisure field
(xiii) Construction field /Architectural field

(a) Uses of computers in Education


1. Timetables: Used to devise/design timetables using special software.
2. Communication: Students can communicate with students in other countries, and corporate with them
on research projects.
3. In teaching, we use Computer Assisted Instruction (CAI) by use of Interactive whiteboards, and
projectors, in class.
4. Records management: Computers are used in School administration to register students & record
attendance.
5. Report Cards: Students‘ Progressive Report Cards can be produced electronically by use of computers
instead of hand-written ones.
6. Distance learning (e-learning) through computer based training. People get award such as degrees
without going to class.
7. Simulation: Teachers use simulation software to perform difficult or dangerous experiments in class
8. Use of special facilities for students with disabilities like text to speech and speech recognition to help
blind students.
9. Websites: Schools use computes to create school websites for sharing information with the public.
10. Projects: Productivity tools like desktop publishing and presentation software are used in projects
and other school activities.
11. Time management: Digital computers are also used for telling and managing time in schools.
12. Students can also use computers to write reports, produce school newsletters and design posters.

(b) Uses o f computers in Research


1. Computers are dispensable throughout the research process.
2. Data Storage: Data can be stored for immediate use or can be stored in auxiliary memories like
Compact disks, memory cards, so that they can be retrieved later.
3. The computers assist the researcher throughout different phases of the research process.
4. In scientific research they are used at all stages of study-from proposal/budget to
submission/presentation of findings.
5. They have made searching the literature and references easier through use of electronic databases on
the World Wide Web e.g. an online encyclopaedia such as Wikipedia has over 15 times as many words
as compared to printed Encyclopaedia like Britannica.
6. Computers have tools such as Spell checking, cut-and-paste, etc., which make compiling and editing
research work easier.
7. A lot of statistical software is available for performing calculations and analysing the collected
research data.
8. Research publishing: The research work can be converted to Portable Document Format (PDF) and
published to the World Wide Web.

(c) Uses of computers in business and administration


The use of Computers has affected every aspect of business, transforming not only the way that
business is conducted but also creating new Businesses sectors and jobs. Most offices today depend on
computers.
Some examples of the nature of this change include:
Computers enable people to work from home, using computers connected to the employer‘s network or
via the internet. This is known as Telecommuting.
Employment: Computers have created more jobs such as computer Technicians, Computer Teachers,
etc.
Source of income: Buying and selling of Computers and their components is a source of income to
individuals, and companies.
Through, Computer Aided Design (CAD), scale drawings, and excellent designs can be created easily.
Mobile financial service: Computers are used for sending and receiving Mobile money and making
worldwide money transfers.
Banking: Banks use computers to manage transactions and Automatic Teller Machines (ATMs) for 24
hour banking.
Websites and Advertising: Computers help in creating Business advertisement through designing
websites, billboards, flyers etc.
Keep records: Computer programs such as QuickBooks & other accounting programs allow businesses
to keep detailed records
Computers are used in typesetting during the production of document printouts and publication of
Books for sale.
E-Commerce (Electronic commerce or EC): through sale of products (goods & services) over electronic
systems such as the internet and other computer networks.
Production of goods: Through Computer Aided Manufacture (CAM), computers can be used to control
the production of goods in factories.
Research: Business can use internet to research its competitor‘s products and prices by studying their
websites.
Communication: Co-workers can easily communicate with each other through e-mail. Customer service
departments can also use e-mail and instant messaging services to communicate effectively with
customers.
Software Development: Software can only be made using computers for the purpose of helping
businesses to combine processes and carry out their work properly.
Seminars, conferences and meetings can be scheduled with bosses and big corporate giants through web
conferencing that can be heard by all the employees simultaneously.
Customer Interaction: Computers now assist human call centres with answering customer questions,
taking payments and providing general assistance

e) Health and medicine


The administration of hospitals depends more and more on computers. Some of the uses include the
following;
1. Scheduling expensive and scarce equipment.
2. Making appointments for patients, printing labels, allocating beds; make staff rosters, etc.
3. Controlling ambulance fleets
4. Keeping comprehensive patient records electronically, rather than paper files.
5. Most modern drugs are designed with aid of computers & manufactured under computer control.
6. The Magnetic Resonance Imaging (MRI), CT scan, Ultrasound devices etc are amongst the uses of
ICT in hospitals.
7. Web conferencing helps doctors treat people remotely.
8. Medical tests for instance blood, cancer, Brain damage etc
9. Carrying out sensitive operations on sensitive body parts like the brain, heart, kidney etc
10. Drug mixing and prescriptions are also done.
11. Internet helps us get Web sites for information on health care, treatments, conditions, etc.
12. Monitoring patient‘s conditions and alerting staff when abnormalities arise.
13. Medical Training is facilitated by Simulation software and on-line data sources.

(e) Uses of computers in Communication


1. E-mail services: Electronic Mail sent from one person to other using connected computers helps a lot
in the area of communication.
2. Tele Conferencing and Video Conferencing: enables people in different locations to conduct meeting
as if they are in the same location
3. Faxing; Computers are used for sending an image of a document electronically.
4. Computers enable people to send voice, image, text and data through Telephones and mobile cell
phones:
5. Exchange of information: Today computers are capable (through a phone line or cable connection) of
exchanging information over internet.
6. Students might use computers to communicate with their classmates about homework assignments,
group projects, or other school-related activities.
7. Social Networks such as Face book and Twitter enable people to stay In touch with their relatives,
friends and interests

(f) Uses of computers in Military/Security.


Generally, security is today far much better than it was previously, thanks to the introduction of
Computers into this field.
1. Computer Simulations allow the military to train soldiers for severe combat situation.
2. Communication systems are widely used in the military to coordinate the personnel.
3. Some computers can detect temperatures and alarm in case of danger of fire outbreaks.
4. Computers are used for capturing data for Police National Computer Databases, Vehicle Number
Plates, Criminal finger prints etc.
5. Data storage: information about criminals under investigation by security organs like police, is today
more safely or securely stored in computers.
6. Closed- Circuit Television (CCTV) systems right from home, on the streets, in the work
places/offices like banking halls shopping malls, are indeed tightening security in those areas.
7. Gadget-tracking devices like car, laptop, mobile phone trackers, are also present today.
8. Computers are used to detect presence of illegal devices such as bombs.
9. Computers are also used for controlling dangerous weapons such as missiles.
10. Computers help design and test new systems

(g) Uses of computers at home


In the home, computers have found a wide variety of uses;
1. For playing games
2. For doing School Assignments (Home Work)
3. For keeping household accounts
4. For Accomplishing Work related tasks
5. For getting information over the Internet (for example, to research ancient history for a homework
project or for checking the scores in the English Premier League)
6. For playback of Digital Media such as Video/Music/Family Pictures at home
7. For sending e-mail to friends and relatives abroad.

(h) Uses of computers in Leisure and Entertainment.


Computers introduced completely new type of entertainment like Computer games.
Listening and recording music, Video editing, CD burning, etc.
Messengers also allow us to connect to our friends across the world and talk to them.
Websites which carry news and other matters related to entertainment become a major source.
Online games allow us to play with other people who have access to that game in a virtual world, while
all seated in our own room in front of our PCs.
Photographers and videographers, Digital cameras, mobile phones and other devices are used to take
/make high quality photos/videos.
Satellite communication is also bringing a new dimension in entertainment especially through digital &
satellite TV systems such as DSTV.
Computers are also used in Cinema halls and podiums for faster instant audio and video playback and
presentation through projectors.

Tasks ideally suitable for computers


Computers can carry out dangerous tasks that humans would prefer not to. These tasks may include;
 Bomb disposal
 Providing round the clock services with minimal human resources
 Digital telephone exchange
 Computerized monitoring of stations in remote areas and hostile areas for further technological studies
 ATMs and electronic banking
 Monitoring vital functions in hospitals, etc

However, computers are not always the answer. In some areas human being may be better than
computers.

Where would a human being be better than computers?


A human being would be better than computer in the following situations;
 Where a task involves the human touch
 Where human feelings need to be taken into account
 When it comes to performing tasks that are different every time
 In a situation where creativity is required
 When reacting to unpredictable situations
 In situations when human judgment is required or needed

PARTS OF A TYPICAL COMPUTER SYSTEM


Each computer system consists of both hardware and software. From the definition of a computer, each
of the above functions has devices or components associated to it that enable the user to carry out
various activities.
For example; A typical computer system is comprised of Input Components; (Keyboard, Microphone,
Punch cards and Mouse), Processing Components; (CPU), Storage Components; (Hard and Flash
drives, Floppy disks, Optical Media, Diskettes, Magnetic tapes), Peripherals; (Photocopiers, Scanners,
Fax machines), Output Components; (Monitor, Printer, audio speakers etc) and Communication
Components (Network Interface Card, Modem and wired cables).
A MODEL ILLUSTRATING PARTS OF A TYPICAL COMPUTER SYSTEM

The computer comprises of electronic elements like transistors, resistors, disorders etc, with an
internal storage or memory for storing both the instructions and data being processed while using
programs or set of instructions with specific procedure of operation to be followed. A Graphical
FIGURE SHOWING PARTS OF A TYPICAL COMPUTER SYSTEM
ACTIVITIES OR FUNCTIONS PERFORMED BY COMPUTERS
Understanding the computer as a computer system is vital to the effective use and management of
computers.

A computer system is a system of hardware devices and software components organized according
to the following system functions or basic activities which includes for instance; input, processing,
output, storage and control.

a) Input: Input into a computer may take the form of information and data provided to the
computer by a person, the environment, or another computer. The input is converted into electronic
machine readable form for direct entry or through a telecommunications network into a computer
system.
For example Input inform of words and symbols, numbers, pictures, audio signals from a
microphone, signals from another computer, temperature, speed, pressures, etc. The typical input
devices of a computer system include; sensors, keyboard, touch screens, light pens, electric mice,
optical scanners and voice input and so on.

b) Processing: Computer processing takes the format of manipulating data inputs; data are symbols
that represent facts, objects and symbols The CPU is known to be the brain of a computer
responsible for executing a given set of instructions both arithmetic (-,/,+,* etc) and logical
comparison between two or more statements plus controlling all other hardware. One of CPU‘s
major components is the arithmetic-logic unit (ALU) which performs the arithmetic and logic
functions and the control unit (CU) which controls all the processing functions and communicates
with other parts of the computer plus controlling the processing of all instructions and the
movement of data within the CPU.

c) Output: These are converted electronic information and results produced by the computer system
into human-intelligible form for presentation to end-users. Examples of output include; images on
the monitor, printed documents, sounds, signals to device controllers. Examples of output devices
include; video display, units, audio response units, printers etc.

d) Storage: Memory is the area of the computer that temporarily hold data that is awaiting to be
processed, stored or output, while storage is the area where data can be left on a permanent basis
while it is not needed for processing. Storage devices include: firstly the primary storage unit (Main
memory) and secondly, the secondary storage devices (magnetic disk and tape units, optical disks).

e) Control: The control unit of a CPU interprets computer program instructions and transmits
directions to the other components of the computer system. One of CPU‘s major components in
charge of control is the control unit (CU) which controls all the processing functions and
communicates with other parts of the computer plus controlling the processing of all instructions
and the movement of data with in the CPU
DATA AND INFORMATION
1. DATA
Data is defined as raw facts and figures that have less meaning to the end user.
Examples of raw data include;

1. Student‘s marks
2. Employee salary and wedges.
INFORMATION

Information is a processed data which is meaning full to the end user.


Examples of information

1. A students report
2. Payroll for employees

THE INFORMATION PROCESSING CYCLE


This involves different stages the data goes through to be transformed into information. The series of
input, process, output and storage (IPOS) activities are often called information processing cycle.

Data Process Information

Process

Basic stages of Information processing cycle


The following are basic stages of information processing cycle i.e.
Collection
Preparation of data
Input of data
Processing of data
Output of information

Collection of data
This involves capturing data from different sources such as text book, Internet, people, etc, and
recording it onto some media such as paper.

Preparation of data
This stage involves copying, grouping or arranging data in a more convenient way for input.

N.B
Checking and verifying the data collected are done at this stage.

Data verification is checking of mistakes or transmission errors when data is copied from one place to
another.
Data validation: This is the checking of input data for errors before processing.
Data validation techniques
Presence check: This is to ensure that data is actually present.
Range check/character check/alphanumeric check: This is to ensure that entered data is of correct type
like numeric or alphabetic.
Consistence check: This is to compare new data with previous data e.g. current gas meter reading
against past readings.
Control total check: This is to compare the computer calculated total like the total value of all the
invoices with the manually calculated total.
Hash total check: Is to compare the computer calculated total with the manually calculated total

Input of data
It involves entering the data or sending the stored data into the processing system. Checking the
accuracy and validity of the input data are often done at this stage.

The Processing of data


This stage involves calculating or manipulating the data input and even storing the result for future use.

Output of information
This stage involves giving out the processed results in a readable form or report.

Data verification
This refers to the checking of input data for errors before brought out. E.g. is it of the correct data type.

Common data collecting and processing equipments


Types of writer or manual electronics:-
Fax machine
Telephones
Computers
COMPUTER CARE AND SAFETY

This is a room that is specially designed and prepared to facilitate the installation of computers and to
provide a safe conducive environment for teaching and learning of computer studies.

Factors to consider when preparing a computer laboratory


Security of computers, programs and other resources.
Reliability of the power source.
The number of computers to be installed and the available floor space.
The maximum number of users that the computer laboratory can accommodate.

Why must there be safety rules and precautions in the computer laboratory?
- To avoid accidental injuries to the users.
- To avoid damage of computers.
- To avoid lack of a conducive teaching-learning environment.

PRECAUTIONS TO TAKE IN A COMPUTER LABORATORY


1. Switch on the computer system starting from the wall socket, UPS or stabilizer, computer then other
peripherals like the printers
2. Avoid making connections when the computer is on power e.g. keyboard connections, mouse, printer,
monitor, etc.
3. Avoid abrupt switching off and on the computer system. Use the normal way of shutting down or
closing all the programs then shut down the computer from the start button.
4. Place the computer in a dust free environment with good ventilation. Dust covers should be used to
cover computers when not in use and if you are using polythene covers, then do not cover the
computer immediately after switching off as it will trap heat.
5. The computer should not be exposed to direct sunlight.
6. The computers should be regularly serviced at least once a year or more frequently if the environment
is dusty. There should be blowing of dust from the machines. Clean the monitor and other machines
with a dump cloth. Don‘t drop water in the machines. If you drop water, do not use the machines until
the water evaporates.
7. Do not open the computer for inside cleaning. It should be handled by qualified personnel.
8. It is good practice to keep record of the daily condition in case of computer failure.
9. The peripheral devices such as printers and mouse should be regularly serviced.
10. The floppy disks used for installation of programs and backups should be kept safely in disk banks
and kept away from sunlight and magnetic media.
11. Diskettes have to be write protected all the time especially for installation diskettes and remove the
write protection when writing on them if they are used for back up.
12. In areas where the power fluctuates, it is important to either use a stabilizer or UPS to ensure steady
input of power to computer systems.
13. Food and drinks should not be allowed near computers.
14. Avoid smoking from the computer-room.
15. The computer system should not be connected to an electric line shared by other heavy equipment.
Major characteristics of modern computers
For a device to be regarded as a computer, it must have or manifest some or all of the characteristics
below;
 Speed  Diligence  Connectivity
 Accuracy  Artificial Intelligence (AI)  Multitasking
 Storage  Automation

Speed
Computers are very fast in their operations in that their speed in measured in millions of instructions
per second (MIPS)

Accuracy
Computers are known to be so accurate that they hardly make any mistake. In fact computers are
capable of detecting and correcting wrong mistakes made. It follows therefore that if wrong data is
fed into the computer, wrong results are expected out. Hence the saying, ―garbage in garbage out‖
(GIGO)

Storage
For a computer to be able to work, it must have some
work space where data is stored before being processed or where information is stored before being
output to particular devices. This storage space is called memory.

Diligence
Computers have the ability to perform the same task over and over without getting bored or tired.
This is seen in industrial robotics, like in car assembly lines.

Artificial Intelligence
Computers are artificially intelligent. They can respond to requests given to them and provide
solutions. This is accomplished by the power of the programs installed in them.

Note:
1. Installation is the term used to refer to the act of adding or improving a program on your computer
2. A computer program is a set of instructions written in computer language e.g. Microsoft word,
Microsoft excel, Microsoft Power point, Microsoft Access, Microsoft Publisher, Note pad, Word pad
etc.

Automation
Computers work automatically. They do not need any supervision in order to perform programmed
routines.

Multitasking
Computers have the ability of handling different types of tasks at the same time. i.e. a user can
instruct it to print, scan for viruses, play music, search for the lost file, to mention but a few. All the
above activities can be done at the same time or even more. Hence the term multitasking.

Connectivity
If computers are joined together i.e. interconnected using a given network media, then connectivity
becomes another characteristic. This is aimed at sharing resources such as files, printers, programs,
disk drives, etc.
COMPUTER CLASSIFICATIONS
Computing devices fall into various classes. The basic computer classifications include;
1. Classification by purpose 3. Classification by size
2. Classification by process 4. Classification by processor power

Classification by purpose
Here computers are classified according to the work they are designed for. This classification is
further divided into two sub-classes i.e.
 Special purpose computers  General purpose computers

Special purpose computers


These are designed to handle only a particular task. Their form of operation is restricted in nature e.g.
digital watches, pocket calculators etc.

General purpose computers


These computers are designed to solve a wide range of problems. A typical computer of this type can
perform; calculations, keep date and time, word process documents, store database and so many other
tasks. E.g. Desktop, laptop, palmtop computers

Classification by process
1.6: Categories of Computers
Computers can be categorized according to the process they use to represent data. People
communicate through speech by combining words into sentences. Human speech is analog because it
uses continuous (wave form) signals that vary in strength and quality. Most Computers are Digital.
Computers can generally be grouped under three (3) categories i.e.
a) Analog Computers
b) Digital Computers
c) Hybrid Computers

a) Analog Computers
An analog Computer is a computing device that uses continuously changing values to represent
information.
These computers that represent data or information as continuous variable quantities or Units! It
generally deals with physical variables such as temperatures, weight, voltage, pressure, speed, etc.

Examples of Analog Computers include;


1. The usual weighing scales
2. A slide rule
3. Mercury thermometers
4. Hydraulic Car Lifts
5. Voltmeters
6. Manometers
7. Speedometers
8. Barometers
The slide is a hand operated analog computer for doing multiplication and division, square roots,
cubes and cube roots, etc.

b) Digital Computers
Digital Computers are those, which represent data or information as numerical (binary) digits.
These are computers that use discrete (discontinuous) values, i.e. binary digits (0, 1) to represent data.
Data entered is represented as a series of 0,s and 1‘s, also kwon as binary notation or base two and is
handled by micro processors.
The binary digits simply mean the presence or absence of an electric pulse or voltage. The state of
being ON is represented by 1 and OFF is represented by 0.
Although digital representations are discrete, the information represented can be either discontinuous,
such as numbers, and letters, or continuous such as sounds, images, and other measurements of
continuous systems.
Digital computers are more accurate and work at a very fast rate.

Examples of Digital Computers include;


 Digital Watches
 Electronic calculators
 Mobile Phones
 Digital Cameras
 CCTV systems
 All PCs
 Television Sets

(c) Hybrid Computers


These are computers combine basic features from both Analog & Digital Computers.
A hybrid computer accepts analog signals and converts to digital for processing.
It is mostly used for automatic operations of complicated physical processes and machines. Now-a-
days analog-to-digital and digital-to-analog converters are used for transforming the data into suitable
form for either type of computation.
Hybrid computers are mainly used for specialized tasks.

Examples of Hybrid Computers


Digital gasoline/petrol pumps; they measure physical quantities and represent its values in digital
form.
In Hospitals‘ Intensive Care Units, analog devices measure the patient‘s temperature, blood pressure
and other vital signs. These measurements which are in analog are then converted into numbers and
supplied to digital components in the system.

Difference between Digital Computers and Analog computers


Digital Computers Analogy Computers
- They use binary code to interpret information - They use analog
- They transmit data in discrete form - Transmit data in continuous form
- Fast and expensive - Slow and cheap
- Requires less memory - Requires more memory
- No interference of noise during operations - There is interference
- More accurate in interpreting information - Less accurate in interpreting information

Here general purpose computers are classified according to how data processed is presented. This
classification is further divided into 3 sub-classes i.e.
 Digital computers  Analog computers  Hybrid computers

Digital computers
These are computers that process data that is presented in form of discrete values, i.e. discrete values
are numbers that can be defined like 1, 2, 3, 4, 5, etc. digital watches are an example

Analog computers
These are computers that process data that is in a continuous form or measurable quantities/units e.g.
pressure, temperature, electrical voltage are variable quantities. Examples of analog computers
include those used in applications like thermometers, voltmeters and speedometers.
Hybrid computers
These computers have the combined features of both digital and analog computers i.e. they deal with
analog signals and digital signals at the same time.

Note:
The transfer of digital signals to analog signals is called modulation and analog to digital is called
demodulation hence the term ―Modem‖.

Classification by size
Here hybrid computers are classified depending or according to the user capacity and size of the
machine. This classification is further classified into 3 sub-classes or categories i.e.
 Super computers  Mini frame computers
 Mainframe computers  Microcomputers/Personal computers

Supercomputer
An extremely fast computer, which can perform hundreds of millions of instructions per second

Main Frame
These are very large computers normally owned by the state and process data at high speed. Multi-
user computer system capable of supporting hundreds of users simultaneously. Software technology is
different from minicomputer.

Mini frame computers


These are smaller than the mainframe computers and owned by same big corporations and research
centres. They are capable of supporting between 50 – 500 users at a time.

Microcomputers/Personal computers (PCs)


These are the smallest compared to the above two categories i.e. mainframe and Mini frame
computers. These support only one user at a time, meaning that all system resources are utilized by
one user only. Microcomputers are further classified into 3 categories i.e.
 Desktop computers
 Laptop computers
 Palmtop computers
Desktop computers
These are designed to be stationed in one place probably on top of a desk or table

Laptop computers
These are computers that are smaller than desktop computers and are designed for
mobile computing. They have all the facilities and system resources offered by desktop
computers

Palmtop computers
These are smaller than laptop computers. They are designed for those people who are
ever on the move. Like the laptops, palmtops have all the facilities and the system
resources offered by desktop computers

CHAPTER TWO

COMPUTER HARDWARE
o Categories of computer hardware
o Application of different hardware components

DEFINITION OF HARDWARE
Hardware: This refers to the physical or tangible components of a computer system.
Hardware can be physically seen by our naked eyes.
Hardware can be divided into five main types:
• Input hardware
• Processing hardware.
• Output hardware
• Storage hardware.
• Communication hardware.
DEFINITION OF INPUT DEVICES
• Input devices are used to enter data/commands/instructions in a form that the
computer can use.
• They send the data or commands to the processing unit.
• They can be used to capture data to be entered into the computer
Illustration of different hardware

INPUT HARDWARE
Different data types entered into a computer system:
• Text data
• Images/graphics
• Videos
• Audio
According to the type of data they input, they can be grouped into the following :
a) Text input devices
b) Pointing input Devices
c) Imaging input Devices
d) Gaming input Devices
e) Audio input Devices
f) Biometric input Devices and
g) Other Specialized input devices

KEYBOARD
Definition: It is a primary text input device on a computer.
It consist of the following sections.
Typewriter Area (A-Z)
Numeric key pad (0-9)
The Functional Keys (F1-F12)
Arrow keys or Cursor movement key

FUNCTIONS OF A KEYBOARD:
• It is used to enter data into a computer, its keys allow the user to type data in form of
text or numbers
• Can be used to command the computer to perform an operation using the keyboard
shortcuts, such as ctrl + s for saving data/information et
• It is a major connector or interface between the computer and the user without which
the user commands will not be put in a language the computer understands.
Distinguish Between A Special Key And A Modifier Key On A Computer Keyboard
• Modifier key: Is a special key on a computer keyboard that changes the normal action
of another key when the two are pressed in combination. For example, <Alt> + <F4>
in Microsoft Windows will automatically close the program in an active window.
• Whereas a special key is a unique key on a computer keyboard that independently
performs a specific function/operations; caps lock
MODIFIER KEYS
Alt key:-
• The Alt-key combines with other keys to perform specific functions.
• In most window programs, the main menu Tabs have got underscored letters e.g. File,
Edit, View, Format, Tool, Table, Window and Help.
• Pressing Alt with the underlined letter will activate that menu.
• Alt + F4 = Exits a program.
Control (ctrl) key.
• Used with other keys to perform specific functions/operations e.g.
• Ctrl + F2 = Print preview, Ctrl + Alt - Adds a new page (Page Beak)
• Ctrl + Alt + F2 = gives ‗Open file dialogue box‘.,
• Ctrl + Alt + Del = Initiates a reboot (warm boot)
• Ctrl + P = initiate print dialog box ,Ctrl + B = bolds a selection
• Ctrl + S = saves a file
• Ctrl + V = Paste, Ctrl + W = New file, Ctrl + X = Cut.
• Ctrl + Esc = Activates the startup menu.Etc
Shift Key.
• Makes one alternate between lower and upper case characters during routine
typesetting operations. It is also used for other short cut operations e.g.
• Shift + F3 = Alternates between lower and upper case characters, title case and
sentence case.
• Shift + Arrows = used to select text.
• Shift while inserting a CD-ROM to deactivate the auto-run.
SPECIAL KEYS
• Windows key: Activates the start-up menu for the computer user to run shutdown,
Run, Help, Search, Settings, Documents, programs, Control panel, etc.
• Enter key/Return:
• Used to confirm commands or move the cursor/insertion point to a new line.
• Tab key:
• In normal typesetting, tab keys help in having data in columns with smooth margins.
And also for indentation
• When working with tables it is used to move from field to field, and to add a
field/Row in a table.
• When the cursor is in the last bottom cell of the table, pressing tab key adds another
row.
• Shift + Tab take you back to the previous field.
• Space bar:
Is a key on an alphanumeric keyboard in the form of a horizontal bar in the
lower - most row, significantly wider than
Creates gaps between characters and words during typing
• Caps lock:
Is a key on a computer keyboard. Pressing it causes the keyboard to go into a
mode in which letter keys are interpreted as capital letters by default . The caps lock
does not affect the number or punctuation keys.
• Escape (ESC) key = used to Exit/close a dialog box.
• Insert = for overtyping.
• Delete key = erases one character at a time on the right of the cursor.
• Back space key = deletes one character at a time on the left of the
cursor.
• Num lock key. = Activates the numeric keypad.
• Print screen key = for printing what is on the computer screen.
Scroll Lock key = for scroll lock. Disabled in modern keyboards
CURSOR CONTROL KEYS
• Home = Moves the cursor at the beginning of a line.
• End = Moves the cursor to the end of a line.
• Page up = Moves the cursor to the top of the page.
• Page down = Moves the cursor to the bottom of a page.
FUNCTIONAL KEY:

• Is a key on a computer or terminal keyboard which can be programmed so as to cause


an operating system command interpreter or application program to perform certain
actions? On some keyboards/computers, function keys may have default actions,
accessible on power-on. i.e. F1=help

POINTING DEVICES
A pointing device is any computer hardware component (specifically human interface
device) that allows a user to input spatial (ie, continuous and multi-dimensional) data to a
computer. Mostly by Computer Aided Design (CAD)systems and graphical user interfaces
(GUI) and activating switches on the mouse. Movements of the pointing device are echoed
on the screen by movements of the pointer (or cursor) and other visual changes
A COMPUTER MOUSE

FUNCTIONS OF A MOUSE.
• The mouse is used as a pointer to move to, or select a particular section of
the displayed window.
• It is used to complement the keyboard especially in a graphical interface
environment
• Its right button provides an array of time saving shortcut menus.
CORDLESS MOUSE/WIRELESS MOUSE
OPERATIONS OF A MOUSE
• Clicking. It is an act of pressing and releasing the left hand button of
the mouse once.
• Right clicking. It is an act of pressing and releasing the right mouse
button once.
• Double clicking. Is the act of pressing a computer mouse twice
quickly without moving the mouse
• Dragging. Is an act of pointing at an item, then hold down the left
mouse button as you move the mouse.
• Scrolling. It is an act of navigating the window page up or down by
moving the wheel like button.
• Dropping. This refers to the

LIGHT PEN
A light pen is a handheld pen like pointing device that has a light
sensitive point to select options on the screen.
JOYSTICK
• A joystick is a pointing device with a vertical lever mounted on a base to
control the position of the cursor.

TRACKBALL
• A trackball is a stationary pointing device with a ball mechanism on its
top.
TOUCH SCREEN
• A touch screen is an input device that permits the entering or selecting of
commands and data by touching the surface of a sensitized video display
device with a finger or a pointer.

TOUCH PAD
• A touch pad is a small flat rectangular pointing device that is sensitive to
pressure and motion.
STYLUS AND A DIGITAL PEN
Looks like a ballpoint pen, but uses pressure to write text
and draw lines

IMAGE INPUT DEVICES


• Image scanner • Optical mark recognition
reader(OMR)
• Digital camera
• Quick response
• Web camera
• Cyber glove
• Digital video camera
• A magnetic stripe card reader
• Bar code reader
• Magnetic ink character recognition
reader(MICR)
• Optical character recognition
reader(OCR)

BAR CODE READER


• A bar code reader, is an optical reader that uses laser beams to read bar codes that are
printed on items usually in super markets.
• A bar code is a set of parallel printed lines of differing thicknesses, which
are used to store coded information about an item.
IMAGE SCANNER
• In computing, a scanner is a device that optically converts images, printed text, handwriting, or an object, and
converts it to electronic/digital form.
• Or reads and input text or graphics from hard copies (printed)into electronic format.

Three Popular Types Of Scanners Are:


• A flatbed scanner works like a copy machine except that it creates a file of the document rather than a paper
copy.
• A sheet feed scanner has motorized rollers that can feed the source document across the scanning head
during the scanning process.
• A handheld scanner can be manually passed over the image to be scanned.

• The quality of a scanner is determined by its resolution and color depth.

FLAT-BED SCANNER
• A flatbed scanner works like a copy machine except that it creates a file of the document rather than a paper
copy.
SHEET FEED SCANNER
• A sheet feed scanner has motorized rollers that can feed the source document across the scanning head
during the scanning process.

HANDHELD SCANNER
• A handheld scanner can be manually passed over the image to be scanned.
DIGITAL CAMERA
• A digital camera is an image input device that takes video or still photographs, or both, and records them on a
light-sensitive sensor.

MICROFILM CAMERA

DIGITAL VIDEO (DV) CAMERA


• A digital video (DV) camera, by contrast records video as digital signals instead of analog signals.
• To transfer recorded images to the computer hard disk, users connect DV cameras directly to a port on the
system unit.
• After saving the video on a storage medium, you can play it or edit it and burn it to a DVD using software
programs on the computer.
CAMCORDER
This is a light weight video camera that records data in digital form onto a storage device such as a videotape

WEB CAMERA
• web cam is a digital video camera. It can be directly connected to a computer. It usually takes a digital picture
at regular intervals and uploads the picture to an Internet website. Web cams are used for teleconferencing.
Users communicate with each other using microphones and speakers as well as web cams to see each other on
their monitors.
CLOSED CIRCUIT TELEVISION (CCTV)
CCTV, or closed-circuit television, is a system that allows you to keep an eye on what‘s going on in and around
your business. Cameras and monitors enable you to view events live, and recorders archive footage for later
reference
MAGNETIC INK CHARACTER RECOGNITION READER (MICR)
• It is an image input device that reads Characters printed using special magnetic ink, which contains iron oxide. i.e.
The Bank Cheque Number, the Branch Sort Code and the Account Number are printed in magnetic ink at the
bottom. As the document passes into the M.I.C.R. reader, the ink is magnetized, so that the shapes of the characters
can be recognized electronically. The characters have to be printed in a special font style. The main use of MICR is
to input data from bank Cheque.

QR CODE READER
• Abbreviated from Quick Response Code) is the trademark for a type of two-dimensional bar codes in which
information is represented by black and white dots (so-called "square data dots" or "data pixels"). It looks as
below:
• To read information off a QR code, a QR code reader is used on smart phones, android phones or by modern
bar code readers.
QR Codes can contain more than just a simple link to a website: Use them to link to a video, your Face book
profile or an MP3 file—anything a modern Smartphone is capable of doing. Directly take your visitors to the
relevant content, without the bother of typing in complicated URLs.

CYBER GLOVE
• It is an input device for virtual reality environments. Various sensor technologies are used to capture physical
data such as bending of fingers. Often a motion tracker, such as a magnetic tracking device or inertia tracking
device, is attached to capture the global position / rotation data of the glove. These movements are then
interpreted by the software that accompanies the glove, so any one movement can mean any number of
things. Gestures can then be categorized into useful information, such as to recognize Sign Language or other
symbolic functions.
• Magnetic Strip Card Readers
• virtual reality: a computer-generated environment with scenes and objects that appear to be real, making
the user feel they are immersed in their surroundings.

A MAGNETIC STRIPE CARD READER


• A magnetic stripe card reader reads the magnetic stripe on the back of credit cards, bank ATM cards, and
other similar cards.

• Exposure to a magnet or magnetic field can erase the information and contents of a card's magnetic stripe.
BIOMETRIC INPUT DEVICES
• A biometric device translates a biological personal characteristic into a digital code that is stored or compared
with a digital code stored in the computer.
• Common biometric devices include:
• Fingerprint scanner
• Face Recognition systems
• Hand geometry systems
• Signature verification systems
• Iris Recognition systems

A FINGERPRINT SCANNER
• A fingerprint scanner captures curves and indentations of a fingerprint. Some grocery and retail stores now
use fingerprint readers as a means of payment, where the customer's fingerprint is linked to an account or
credit card.

SIGNATURE VERIFICATION SYSTEM


• A signature verification system recognizes the shape of your handwritten signature, as well as measures the
pressure exerted and the motion used to write the signature. Signature verification system uses a specialized
pen and tablet.
HAND GEOMETRY SYSTEM
• Biometric devices measure the shape and size of a person's hand using a hand geometry system. Some large
companies use this system as time and attendance devices or as security devices. Day-care centers use this
system to verify parents who pick up their children.

IRIS RECOGNITION SYSTEM


These are devices that use iris recognition technology to read patterns in the iris of the eye. These patterns are as
unique as a fingerprint. Iris recognition systems are used by government security organizations, the military and
financial institutions that deal with highly sensitive data
GAMING KEYBOARD
• Gaming keyboards typically include programmable keys so that gamers can customize the keyboard to the
game being played.
• The keys on gaming keyboards light up so that the keys are visible in all lighting conditions.

GAMEPAD
• A gamepad controls the movement and actions of players or objects in video games or computer games. On
the gamepad, users press buttons with their thumbs or move sticks in various directions to trigger events.
Gamepads communicate with a game console or a personal computer via wired or wireless technology.
AUDIO INPUT DEVICES
• Midi instruments:
Refers to normal musical instruments which have a midi port for input into a midi interface in the computer. The
music can then be stored as a file, displayed on screen and edited ready for playback

SOUND CARD
• A sound card is a device that can be slotted into a computer to allow the use of audio components for
multimedia applications. Without a sound card, Audio input and output is not possible.
MICROPHONE
Is the input device used (in conjunction with software such as "sound recorder") to turn sound waves into
digital files that a computer can understand

PROCESSING DEVICES
Processing devices are the computer electronic components and chips housed in the system unit. They are used to
interpret, manipulate, convert, translate and transform input data into information. Therefore, a processing device
handles the intermediate stage in the computer.

The system unit


The system unit is a box-like case/chassis that houses all the internal components of the computer like motherboard,
the disks and drive bays, the power supply and cooling systems. The system unit gives shape and appearance of the
computer. It also protects the internal components against damage. The components in the system unit are connected
to the motherboard. A drive bay is a rectangular opening inside the system unit that typically holds disk drives.
THE SYSTEM UNIT

COMPONENTS INSIDE THE SYSTEM UNIT


• Motherboard

• Power supply

• Central Processing Unit (CPU)

• CD-ROM or DVD-ROM drive

• Floppy disk drive

• Hard disk drive (HDD)

• Expansion cards

• Expansion slots

• Random-access memory (RAM)

• ROM-BIOS

• CMOS chip and cmos battery

• Diodes

• Capacitors
INSIDE THE SYSTEM UNIT

Power supply
Central processing unit

CD-R

CD-ROM/DVD-ROM

Floppy disk drive


Flopp

PORTS
Hard Disk Drive

Hard

Expansion Card
RAM
Expansion slots

Mother Board DATA BUSES


The Motherboard
The motherboard is a single circuit board that provides the path through which the processor communicates with internal and peripheral devices. The
motherboard is also called the system board.

The components attached to the motherboard include the processor chip (the CPU), memory chips, support electronic circuitry, buses, and Expansion
Slots for Adapter Cards

Motherboard

Power Supply and Cooling Technology


• The power supply is the component of the system unit that converts the wall outlet Alternating Current (AC) power of 110 to 240 volts into
Direct Current (DC) power of 0.5 to 12 volts

• Built into the power supply is a fan that keeps the power supply cool. Processor chips generate heat, which could cause the chip to burn up.

• A heat sink is a small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components
such as a processor.
HEAT SINK

POWER SUPPLY

FANS

FANS
THE CENTRAL PROCESSING UNIT
Central Processing Unit (CPU), or sometimes just called processor/ Microprocessor

It acts as the brain of the computer system. It reads and interprets software instructions and
coordinates the processing activities that must take place.

It refers to a very large scale integrated circuit technology that incorporate the computer memory,
logic and control circuits on a single

SECTIONS OF THE C.P.U.

Out put
REGISTERS
In put CU ALU

The control unit,


the Arithmetic Logic Unit
the registers

The Control unit


• The control unit manages what is happening in the CPU.

• it directs the order of operations.

• The control unit retrieves one instruction at a time from a stored program.

• It interprets the instruction and sends signals to the ALU directing it to execute the instruction.
• it communicates with the input devices in order to transfer program instructions and data into storage.

• The control unit also communicates with the output device to transfer results from storage to the output devices

• It also coordinates and provides timing for each operation

ARITHMETIC/LOGIC UNIT (ALU)


• Handles arithmetic and logic computations

• The arithmetic operations it handles are addition, subtraction, multiplication and division. The logic operations it
handles are comparisons such as greater than, less than and equal to, true or false

REGISTERS
• Is a small amount of storage available on the CPU whose contents can be accessed more quickly and directly.

• Registers are high-speed working storage areas that temporarily hold instructions and data.

• Registers work under the direction of the control unit to accept, hold, and transfer instruction or data and
comparisons at high speed.

• Registers are not part of Memory or Secondary Storage: Registers hold data immediately related to the operation
being executed. Memory is used to store data that will be used in the near future. Secondary storage holds data that
may be needed later (in future)

Types of registers
• Instruction register, which contains the instruction being executed;

• Address register, which keeps track of where a given instruction or piece of data is stored in memory;

• Storage register, which temporarily holds data taken from or about to be sent to memory;

• The Accumulator, which collects the result of computations;

• General-purpose register, which is used for several functions, as assigned by the CU

Cache memory
• A CPU cache is a high speed memory used by the central processing unit of a computer to reduce the average time to
access memory.

• The cache is a smaller, faster memory which stores copies of the data from the most frequently used main memory
locations.
What is a machine cycle?
• It refers to the stages of data processing with in the C.P.U.

Step 1. Fetch
Obtain program instruction
or data item from memory

Memory

Step 2. Decode
Step 4. Store Translate instruction
into commands
Write result to memory

Processor
Control Unit
ALU Step 3. Execute
Carry out command

The four basic operations of the machine cycle are:


• 1) Fetching—the process of obtaining a program instruction or data item from memory.

• 2) Decoding—the process of translating the instruction into commands that the computer understands.

• 3) Executing—the process of carrying out the commands.

• 4) Storing—the process of writing the result to memory.


Buses
• A bus is a common pathway through which information is connected from one component to another on the
motherboard

• Functions of Buses

• Data sharing - the expansion bus must be able to transfer data between the computer and the peripherals connected
to it.

• Addressing - A bus has address lines, which match those of the processor. This allows data to be sent to or from
specific memory locations.

• Power - A bus supplies power to various peripherals that are connected to it.

Timing - The bus provides a system clock signal to co-ordinate the peripherals attached to it with the rest of the
system

Plug and Play (PnP)


• In the past, installing a card was not easy and required you to set switches and other elements on the motherboard.
Today, many computers support Plug and Play.

• PnP refers to the computer’s capability to automatically configure adapter cards and other peripherals as you install
them when the computer is still running.
Ports
• A port is the point at which a peripheral attaches the system unit. Through a port, the peripheral can send data to or
receive information from the computer.

• A peripheral device, such as a keyboard, monitor, printer, mouse, digital camera, and microphone, often attaches by a
cable to a port on the system unit.

• Note: A peripheral device is hardware device connected/attached to the computer externally.

COMPUTER PERIPHERALS (ports)


• PS/2 port, sometimes called a mouse port, was developed by IBM. It is used to connect a computer mouse or keyboard. Most
computers come with two PS/2 ports.

• A serial port is a type of interface that connects a device to the system unit by transmitting data one bit at a time. It usually used
to connect devices that do not required fast data transmission rates, such as a mouse or keyboard.

• Parallel ports allow the parallel transmission of data; that is, several bits are transmitted simultaneously. These ports provide the
interface for such devices as high-speed printers.

• USB (Universal Serial Bus) ports are used in high-speed device interfaces.

• Bluetooth ports use radio waves to transmit data between two devices, without using cables.
Connectors
• A connector joins a cable to a port. A connector at one end of a cable attaches to a port on the system unit, and a
connector at the other end of the cable attaches to a port on the peripheral. Most connectors are available in one of
two genders: male and female.

• Male connectors have one or more exposed pins.

• Female connectors have matching holes to accept the pins on a male connector.
Expansion slots and Adapter cards
• An expansion slot is a socket on the motherboard that can hold an adapter card .An adapter card, also called
expansion card, is a circuit board that increases the capabilities of the system or provides connections to peripherals.
Some motherboards include all necessary capabilities and do not require adapter cards. Adapter cards are used for
many supplemental capabilities, such as more memory, higher-quality sound devices, a modem, extra ports, or
graphics capabilities.

EXPANSION CARDS
Commonly used adapter cards and their functions
Adapter Card Purpose

Sound card Connects speakers or a microphone

MIDI card Connects musical instruments

Network interface card (NIC) Connects other computers

Video card Connects a monitor

USB card Connects USB devices

TV tuner card Allows viewing of television channels


Video capture card Connects a video camera

Modem card Converts telephone or cable analog signals to


digital and vice versa

FireWire card Connects FireWire devices

CMOS
• Complementary Metal-Oxide Semiconductor (CMOS) technology provides high speeds and consumes little power.

• CMOS technology uses battery power to retain information even when the power to the computer is off.

• Battery-backed CMOS memory chips, for example, can keep the calendar, date, and time current even when the
computer is off.
PRIMARY MEMORY
• Primary storage (also called main storage, main memory, or internal storage) holds all instructions and data needed
for processing

• It consists of:

• RAM: Random Access Memory

• ROM: Read Only Memory

Random Access Memory


• This is the memory or the temporary location which holds the software and other input data while the computer is
working.

• The contents of RAM can be altered, deleted, copied and read.

• It is the main working memory of the computer i.e. the higher the RAM the better the personal computer.

CHARACTERISTICS OF RAM
• It is volatile and therefore loses its contents when the computer is switched off.

• It is read, copied, wrote, altered and deleted

• The amount of data it can hold at a given time is highly limited

• It is expensive compared to ROM.


Basic types of RAM
• Dynamic RAM (DRAM) must be refreshed (or recharged) constantly by the CPU.

• Static RAM (SRAM) is faster and more reliable than any form of DRAM. The term static refers to the fact that it does
not have to be re-energized as often as DRAM.

• Magneto resistive RAM (MRAM), stores data using magnetic charges instead of electrical charges.

• MRAM has greater storage capacity, consumes less power, and has faster access times.

• Virtual RAM (VRAM): Modern operating systems can use spare storage space on the hard disk as if it is working
memory and this is referred to as Virtual memory or Virtual RAM

READ ONLY MEMORY ROM


• A computer has a built up set of instructions (non volatile) it has to know what to do when switched on and those
instructions are residents on ROM

• The instructions in Rom are stored permanently; the computer can read or follow instructions in Rom but cannot
change them.

• Cannot write and thus called read only. A good example of Rom is BIOS which performs the POST (power on self test),
which initializes the computer when power is turned on.

• CHARACTERISTICS OF ROM

• It is non-volatile, meaning it does not lose contents when power is switched off.

• The computer cannot write to it therefore programs or contents cannot be changed.

• It cheaper compared to random access memory.

READ ONLY MEMORY ROM CHIPS


Differences Between

RAM ROM

1. Volatile, temporally 1.Non Volatile, permanent

2. Contents lost when power goes off 2. Contents remain when power goes off

3. Read and Write 3. Read Only

4. Can be increased 4. Can’t be Increased

5. Not installed at Factory 5. Installed at Factory

RAM and ROM

Memory size
• When data are entered into a computer through a device such as a keyboard, they are not in a form that the
computer can interpret, computers cannot understand the complex symbols that humans use. They recognize only a
code composed of 0s and 1s, known as machine language. Machine language suits the computer because electronic
components and storage media represent two states: on/off, conducting/non-conducting, or present/absent.

• Binary representation

• Data representation in a computer is in binary number system. Which has only two digits 0s and 1s. The computer
interprets the digit 0 as “off” and 1 as “on”. Each 1 or 0 is called a bit, which is short for Binary digit. A bit is the
smallest unit of data a computer can handle.

• A single bit, a 0 or a 1, cannot represent a number or a letter, but by using combinations of the two digits, computer
scientists have developed codes that represent characters (letters, numbers, and other symbols)

UNITS OF DATA STORAGE (memory size)


• The basic unit of data storage is the byte. (B)

• 7-8 bits : 1byte (word/character)

• 1024 bytes(1000) : 1kilo byte (thousands)

• 1024 kilobytes(1000) : 1mega byte (millions)


• 1024 mega byte (1000) : 1giga byte(billions)

• 1024 giga bytes : 1tera byte(trillions)

• 1024 tera bytes : 1 peta byte(quadrillion)

• 1024 peta byte : 1 exa byte (quintillion)

• 1024 exa byte : 1 zetta byte (sextillion)

1024 zetta byte : 1 yotta byte (septillion

BIT Bit refers to binary digit which is the basic unit


of
data. Bit is represented by either 0s or 1s
NIBLE One nibble consists of 4 bits e.g. 0100

BYTE One consists of 8 bits e.g. 011100010

WORD One ward consists of a least 16 bits or 2 bytes

Summary;

1 Character = 8 bits
1 byte = 8 bits
1 Kilobyte = 1024 bytes
1 Megabyte = 1024 kilobytes
1 Gigabyte = 1024 Megabytes
1 Terabyte = 1024 Gigabytes

Note: - The 1024bytes are approximated to 1000byte

1,000,000 Bytes = 1000 Kilobytes = 1 Megabyte


1 Billion Bytes = 1000 Megabytes = 1 Gigabyte
1 Trillion Byes = 1000 Gigabytes = 1 Terabyte

Example2
Example1.
Convert 128byte to Megabytes Solution
Convert 128bytes to kilobytes
Solution
1,000,000 Bytes = 1 Megabyte
1
1kilobyte (KB) = 1000bytes Therefore; 1byte = MB
1 1000000

Therefore; 1byte = KB 1
1000
128bytes = x 128 MB
1000000
1
128bytes = x 128 KB
100
= 0.000128MB

128
128bytes = KB
Therefore 128bytes = 0.000128 MB
100

= 1.28KB

Therefore 128bytes = 1.28kilobytes.


Example3 Example 4

How many bytes are in name NUSIFAH? Convert 0.000127 MB to bytes (KB)
Solution
Solution
1 Megabyte = 1,000,000
From; 1 character = 8 bits Bytes

A name NUSIFAH has 7 characters


0.000127 MB = (0.000127 X 1,000,000)
Bytes
Therefore; 7 characters = (7 X 8) bits
= 127 Bytes
= 56 bits

Then we have to convert the bits to


bytes

But 1byte = 8 bits


1
1bit = bytes
8
1
Then 56bits = x 56 bytes
8
= 7bytes

Therefore; from the above example


1character is equal to 1 byte.
CONVERING DATA UNITS TO BINARY BASE
Exampel1

Convert 128 to binary base


Solution

Ba Num Remin
se ber der
2 128 0
2 64 0
2 32 0
2 16 0
2 8 0
2 4 0
2 2 0
1

Therefore 128ten = 10000000two


CONVERTING BINARY BASE TO DECIMAL BASE (BASE TEN)
Example 1

Convert 10000000two to base ten

Solution

1706050403020100two = (1 x 27)+(0 x 26)+(0 x 25)+(0 x 24)+(0 x 23)+(0 x 22)+(0 x 21)+(0 x 20)

= 128 + 0 + 0 + 0 + 0 + 0 + 0 + 0

= 128ten
CONVERTING BINARY BASE TO ANY BASE LIKE BASE FOUR
Example 1

Convert 10000000two to base ten


Solution

Here you have to convert the binary base to decimal base then to a desired base in this case base four

1706050403020100two = (1 x 27)+(0 x 26)+(0 x 25)+(0 x 24)+(0 x 23)+(0 x 22)+(0 x 21)+(0 x 20)

= 128 + 0 + 0 + 0 + 0 + 0 + 0 + 0

= 128ten
Ba Num Remin
se ber der
4 128 0
4 32 0
4 8 0
2
128ten = 2000four
Computer Storage
• Computer Storage refers to the ability of a computer to keep data or information.

The computer stores data in two ways:

• Temporary storage

• permanent storage

Temporary storage

• This is the ability of a computer to store data or information for a short time as long as the computer is still
on

Permanent storage

• This is the ability of a computer to store data or information on a permanent computer storage medium.

• This Storage is also known as backing storage/secondary storage/ auxiliary storage

Storage devices (secondary storage/memory)


• Secondary storage: storage that supplements primary storage.

• Primary memory can’t store our data and programs permanently we therefore use several
secondary storage media such as compact disks (CDs), floppy disks, magnetic tapes etc.

Definition of Terminologies
• A Storage medium is the physical material on which a computer keeps data. There is a variety of storage
media available.

• Capacity is the number of bytes (characters) a storage medium can hold.

• A Storage Device reads and writes data to and from a storage medium.

• Reading is the process in which a storage device transfers data, from a storage medium into memory.

• Writing is the process in which a storage device transfers data from memory to a storage medium (saving).

• Access time, is a measure of the amount of time it takes a storage device to locate an item on a storage
medium.

• Transfer rate is the speed with which data, instructions, and information move to and from a device.
Transfer rates for storage are stated in Kbps (kilobytes per second).
COMPUTER STORAGE

• Computer Storage refers to the ability of a computer to keep data or information.


The computer stores data in two ways:
• Temporary storage
• permanent storage
Temporary storage
• This is the ability of a computer to store data or information for a short time as long as the computer
is still on
Permanent storage
• This is the ability of a computer to store data or information on a permanent computer storage
medium.
• This Storage is also known as backing storage/secondary storage/ auxiliary storage

STORAGE DEVICES (SECONDARY STORAGE/MEMORY


• Secondary storage: storage that supplements primary storage.
• Primary memory can‘t store our data and programs permanently we therefore use several secondary
storage media such as compact disks (CDs), floppy disks, magnetic tapes etc
STORAGE DEVICE VS STORAGE MEDIA
• Storage devices refer to the Hardware that records and
retrieves items to and from storage media; whereas Storage media is the actual material on which
the data is stored, such as a floppy disk. Storage media are described as below: -
• Types of secondary storage devices/media
• Magnetic
• Solid state
• Optical devices

MAGNETIC STORAGE MEDIA


The term magnetic storage refers to the storage of data on a magnetized device. Therefore magnetic
storage devices are devices that store data using magnetized technology. These media stored data using a
combination of magnetic fields and binary data.
Magnetic storage media represent data as magnetic spots on the tape or disk, with a magnetized spot
representing a 1 bit and the absence of such a spot representing a 0 bit. As advances in technology allowed
these drives to hold magnetic fields more efficiently, their size advanced from kilobytes - thousands of
binary entries -- to terabytes --1,000,000,000,000 or more binary entries
MAGNETIC TAPE

• Magnetic tape is a magnetically coated ribbon of plastic capable of storing large amounts of data
and information at a low cost. Tape storage requires sequential access, i.e. data must be accessed in
the order in which it is stored. If the computer is to read data from the middle of a tape, all the tape
before the desired piece of data must be passed over consecutively. Today, magnetic tape storage is
no longer used for routine processing.

Advantages of using a tape for data storage


• Can hold thousands of megabytes (MB) of data depending on the length of the tape.
• Useful for daily backups of all work and programs on a large network.
• Can be set to run automatically during the night and then will only be needed in an emergency.
• Disadvantages of using tapes:

• Very slow, as need to wind tape (perhaps a long way) to find any specific position .
HARD DISK DRIVE
• A hard disk is a principal mass storage medium in a computer system that stores data magnetically.
• Made of stronger thick non-flexible disk material (aluminum)or (ceramic)coated with magnetic
materials and fixed permanently together with its drive mechanism inside the computer. Data is
stored magnetically. Spinning at the required speed all the time it is very much faster to access than
a floppy disk or CD-ROM (faster than 1 MB per second). Can hold thousands of megabytes
(gigabytes) of data. Used for storing all programs and work files for very fast access by the
computer.
• Characteristics
– They store mass volumes of programs and data thus increases the productivity of a computer
• They are faster in loading or retrieving data and programs than other forms of secondary storage.
MAGNETIC HARD DISK

EXTERNAL HARD DISKS


FLOPPY DISK (DISKETTE)
A floppy disk, or diskette, is a portable, cheap storage medium that consists of a thin circular, flexible
plastic disk with a magnetic costing enclosed in a square-shaped plastic shell

CARE FOR DISKETTES


• Keep diskettes away from magnet fields, such as near wire telephones, loud speakers, and other
appliances, which contain magnets.
• Do not keep heavy objects on top of the diskettes.
• Do not fold or bend diskettes.
• While labeling or writing on the diskettes use felt tip pen, not pencil or ballpoint pen.
• Do not expose the disk to excessive heat or light.
• Do not pull out the diskette from its drive when the drive light is still on.
• Do not use alcohol thinners, to clean the disk surface.
• Do not touch the disk surface.
• Do not bang, drop etc
• Do not splash liquids eg water etc
• Keep out of moisture
ADVANTAGES OF FLOPPY DISKS
• Floppy diskettes are portable
• Floppy diskettes are cheap
• Random Data Access on a diskette is possible
A floppy diskette can be write- protected from being changed

DISADVANTAGES OF FLOPPY DISKS


• Floppy diskettes are not reliable – they need to handled with a lot of care, else risk loosing data.
• Floppy diskettes are not durable.
• Data Access time is relatively slow.
• They have limited Storage capacity (only 1.44MB)
ZIP DRIVE
• The Zip drive is a medium-capacity removable disk storage system with capacities of 100 MB to
750 MB that was introduced by Iomega in late 1994.
• However it was never popular enough.
• Zip drives fell out of favor for mass portable storage during the early 2000s due to emergence of
much better USB flash drives CDs, and DVDs.

SOLID STATE
• Solid state storage (SSS)/flash memory: is a type of computer storage media that is made from
silicon microchips. SSS stores data electronically instead of magnetically
• Flash memory stores the binary data of zeros and ones, but it does so with electrons that shuttle
through the device's circuitry instead of magnetic poles on a disk. Because electrons store the data,
the devices have no moving mechanical parts. This allows the drives to consume less power than
traditional magnetic drives and to retrieve data faster.
SOLID STATE HARD DISK (SSD)
• Stands for "Solid State Drive." An SSD is a type of mass storage device similar to a hard disk
drive (HDD). It supports reading and writing data and maintains stored data in a permanent state
even without power. Internal SSDs connect to a computer like a hard drive, using
standard IDE or SATA connections.
• While SSDs serve the same function as hard drives, their internal components are much different.
Unlike hard drives, SSDs do not have any moving parts (which is why they are called solid
state drives). Instead of storing data on magnetic platters, SSDs store data using flash memory.
Since SSDs have no moving parts, they don't have to "spin up" while in a sleep state and they don't
need to move a drive head to different parts of the drive to access data. Therefore, SSDs can access
data faster than HDDs.
M.2 SSD
• An M.2 SSD is a small form factor solid-state drive (SSD) that is used in internally mounted storage
expansion cards. M.2 SSDs conform to a computer industry specification and are designed to enable
high-performance storage in thin, power-constrained devices, such as ultra-book laptops and tablet
computers. They are generally smaller than other comparable SSDs, such as the mini Serial
Advanced Technology Attachment (mSATA)

USB FLASH DRIVE


• A USB flash drive is a flash memory storage device that plugs in a USB port on a computer. USB
flash drives are convenient for mobile users because they are small and lightweight enough to be
transported in a pocket. Current USB flash drives have data storage capacities ranging from 256 MB
to 64 GB. USB flash drives have become the mobile user's primary portable storage device, making
the floppy disk nearly outdated.

SMART CARD
Smart Card: Contains a processing microchip to provide it with intelligence as well as memory it is really
a tiny computer, eg. the SIM card used in a mobile phone identifies you through a PIN number, identifies
and connects to your service provider and provides a menu of options, as well as storing phone numbers
and phone settings.
A smart card, which is similar in size to a credit card or ATM card, stores data on a thin microprocessor
embedded in the card.
An intelligent smart card contains a CPU and has input, process, output and storage capabilities
A MEMORY CARD
• A memory card has only storage capabilities.
• Applications of smart cards include
• Storing a prepaid dollar amount (e.g., a prepaid telephone calling card).
• Storing patient records and other health-care information.
• Tracking information of customers and employees.
• Flash memory cards are a type of solid-state media, which means they consist entirely of electronic
components and contain no moving parts. Common types of flash memory cards include;
CompactFlash (CF), SmartMedia, miscroSD, miniSD, xD, Picture Card, etc.

ADVANTAGES OF SOLID-STATE DRIVES


• Consumes less power due to no moving parts
• Has a faster data access rate and transfer times
• They are much smaller in size (NVME disks)
• They are harder to damage/ robust
• More durable than magnetic drive/ longer life span
• They don‘t produce noise like magnetic disks
• They are not heavier or bulky

DISADVANTAGES OF SOLID-STATE DRIVES


• They are very expensive to buy especially NVME drives
• They are not compatible to all computers especially old generations
• Limited storage capacities don‘t exceed 4TB like other ordinary drives
• Have a limited number of write cycles
• They are not available on the market.

OPTICAL STORAGE MEDIA


• Optical storage refers to recording of data by making marks in a pattern that can be read back with
the aid of light, usually a beam of laser light.
• The reflected light is converted into a series of bits that the computer can process.
• An optical disc is a flat, round, portable storage medium made of metal, plastic, and lacquer that is
written and read by a laser. Optical discs used in personal computers are 4.75 inches in diameter.
Smaller computers and devices use mini discs that have a diameter of 3 inches or less.
• An optical storage device is an electro-mechanical unit that can save and retrieve (write and read)
information on a special disc medium using a laser light. Optical drives are designed to work with
several types of media: CDs ("compact disc"), DVDs (digital versatile disc" or "digital video disc")
and Blu-ray discs.

CARE FOR OPTICAL DISKS


• The following should be done for the safety of data on Optical disks:
• Do not expose the disc to excessive heat or sunlight
• Do not eat, smoke or drink near a disc.
• Do not stack disks.
• Do not touch the underside of the disk.
• Always store the disc in a jewel box when not in use
• Always hold a disc by its edges.
• Do not drop the disk to the ground.
• Don't bend the disk.

Examples Of Optical Media


CD
DVD
A Blu-ray discs

A compact disc (CD)


• A compact disc (CD) is a flat, round, portable, storage medium that is usually 4.75 inches in
diameter and less than one-twentieth of an inch thick.
• Compact discs store items by using microscopic pits and land that are in the middle layer of the
disc.
• A compact disc stores items in a single track, which is also divided into evenly sized sectors, that
spirals from the center of the disc to the edge of the disc.

CD-R (compact disc-recordable)


• CD-R (compact disc-recordable) is a technology that allows you to write on a compact disc using
your own computer‘s CD-R drive.
• Once you have recorded the CD-R, you can read from it as many times as you desire.
• A CD-R is a multisession optical disc which allows you to write on part of the disc at one time and
another part at a later time.
However, you cannot erase the disc's contents

CD-RW
(compact disc-rewritable)
• A CD-RW (compact disc-rewritable) is an erasable multisession disc that you can write on multiple
times.
• Reliability of the disc tends to drop, however, with each successive rewrite.
• To write on a CD-RW, you must have a CD-RW drive and CD-RW software.
• A CD-RW drive has a lower read and write speed as compared to CD-Rs

DIGITAL VERSATILE DISC-RECORDABLE

Stands for "Digital Versatile Disc Recordable." A DVD-R looks the same as a regular DVD, but like a
CD-R, it can be used to record data. Once a DVD-R has been "burned," or written to, it cannot be written
to again. A basic single-sided, single-layer DVD-R disc can store 4.7GB of data. Double-layer discs can
store 8.5GB, while double-sided DVD-Rs can store 9.4GB.
DVD-R is the most common format of writable DVDs (compared to the DVD+R and DVD-RAM formats).
Most DVD players and DVD-ROM drives can read DVD-R discs. That means you can use a DVD-R disc
to back up several gigabytes of data on your computer or make your own video DVD. The Apple
SuperDrive used in many Macintosh computers supports the DVD-R format.

DVD-ROM
• A DVD-ROM (Digital Video Disc-ROM) is an extremely high capacity compact disc capable of
storing from 4.7 GB to 17 GB.
• A DVD-ROM drive or DVD player is required to read a DVD-ROM.
• Although the size and shape of a DVD-ROM and a CD-ROM are similar, a DVD-ROM uses one of
the following three storage techniques to increase its storage capacity
• The first technique involves making the disc more dense by packing the pits closer together.
• A second technique involves using two layers of pits, which doubles the capacity of the disc.
• Finally, some DVD-ROMs are double-sided, which means that they can be removed and turned
over to read the other side.

DVD-RW
• Stands for "Digital Versatile Disk Rewritable." A DVD-RW is like a DVD-R but can be erased and
written to again. Like CD-RWs, DVD-RWs must be erased in order for new data to be added.
DVD-RWs can hold 4.7GB of data and do not come in double-layered or double-sided versions like
DVD-Rs do. Because of their large capacity and ability to be used multiple times, DVD-RW discs
are a great solution for frequent backups. To record data onto a DVD-RW disc, you'll need a DVD
burner that supports the DVD-RW format

Advantages & Disadvantages of CD


Advantages of compact disc over hard disk include
A compact disc is more portable than a hard disk.
Less prone to viruses than any other medium
Advantages of compact disc over floppy disk include
The storage capacity of a compact disc is very much larger than that of a floppy disk.
The average access time of a compact disc is faster than that of a floppy disk.
Disadvantages of compact disc include
Some kinds of compact discs are read only (CD-ROM and DVD-ROM).
The average access time of a compact disc is slower than that of a hard disk.

BRIEFLY THE DIFFERENCES BETWEEN CD-ROM, CD-R, AND CD-RW.


• A CD-ROM (Compact Disc Read-Only Memory) is a read-only compact disc produced by the
manufacturer.
• A CD-R (Compact Disc-Recordable) is a compact disc that can be written to once but read for
multiple times by a user.
• A CD-RW (Compact Disc-Rewritable) is an erasable compact disc that can be written and read for
multiple times by a user.

HIGH CAPACITY DVD FORMATS


• A Blu-ray Dics-ROM (BD-ROM) has storage capacities of up to 300GB.
• The HD (high-density) DVD-ROM has storage capacities up to 60 GB.
• A mini-DVD that has grown in popularity is the UMD (Universal Media Disc), which can store up
to 1.8 GB of games, movies, or music.

Blu-ray

PHOTOGRAPHIC FILM
Photographic film is a sheet of plastic such as polyester coated with a light sensitive emulsion that is used
to record and store photographs. Normal film is shipped in small canisters (boxes) that protect it from the
light. When exposed to light, it forms an invisible image. Chemical processes can then be applied to the
film to create a visible image, in a process called film developing. A normal photographic film can hold up
to 40 pictures.
OUTPUT DEVICES
• And out put device Refers to any peripheral that conveys /displays(presents)(produces) information
from the computer, to the user.
• Output is data that has been processed into a useful form called information. Computers generate
several types of output, depending on the hardware and software being used and the requirements of
the user.

Display Devices/ VDUs


A display device is an output device that visually conveys text, graphics, and video information.
Or It is an output device that provides the means of obtaining the soft copy.
Information shown on a display device often is called soft copy, because the information exists
electronically and is displayed for a temporary period of time. Display devices are also known as
(Visual Display Units (VDUs)
Commonly used display devices include
(i)CRT Monitors, (ii)LCD Monitors, (iii)Plasma monitors , (iv)Projectors, (v)Headgears and

(vi)LED displays .
Types of monitors
• Cathode ray tube monitors (CRT)
• Liquid Crystal Display (flat panel)
• Plasma screen
• Touch screen
• Organic Light Emitting Display (OLED
CRT MONITORS
• A CRT (cathode ray tube) monitor is a desktop screen that contains a large sealed glass cathode-ray
tube.
• Inside the CRT, an electron beam moves back and forth across the back of the screen.
• This causes dots on the front of the screen to glow, producing an image on the screen.
• Each dot consists of a red, a green, and a blue phosphor, which combine to make up a pixel.
A pixel is a single point in an electronic image

ANTI-GLARE FILTER SCREEN


Screens are normally mounted with rectangular glasses called antiglares which are to reduce on the
intensity of light and the flickering effect.
Antiglares are recommended for any person spending at least two hours a day on a personal computer.
It is advisable to always sit 1 meter way from CRT monitors because they produce electromagnetic
radiation, posing a health risk.

CRT MONITORS
Advantages
• Can produce fast and rich color output
• Images can be viewed from a wide angle
• It is cheaper than LCD monitor
Disadvantages
• It emits higher electromagnetic radiations that cause eye defects
• It consume a lot of power than the LCD

FLAT-PANEL DISPLAYS
• A flat-panel display is a lightweight display device with a shallow depth and flat screen that
typically uses LCD (liquid crystal display) or gas plasma technology.
• Examples of flat -panel displays include LCD monitors, and plasma monitors.
• Many are widescreen, ie much wider than they are tall.
• Screens are measured diagonally from one corner to the other. Common sizes are 17‖, 19‖, 20‖,
22‖, 24‖ and 27‖, 45‖ and 65 inch screens

LCD MONITORS

PLASMA SCREENS
TOUCH SCREENS

LCD (ADVANTAGES & DISADVANTAGES


Advantages
• It consumes less power compared to CRT
• It emits less radiation

Disadvantages
• It is more expensive than the CRT
• Images are viewed from a narrow angel

TERMS
Resolution
• is the number of horizontal and vertical pixels in a display device. It refers to the sharpness and
clearness of an image
• The higher the resolution the better the image
• Often expressed in dots per inch (dpi)

Dot pitch/ pixel pitch


• Refers to the vertical distance between each pixel on a monitor

Pixel
• It is a single point in an electronic image

Refresh rate
• Is the speed that the monitor redraws images on the screen, it is measured in hertz
PROJECTORS
There are two common types of projectors: DLP (digital light processing), and LCD (liquid crystal
display). In the early days of projectors, CRT (cathode ray tube)projectors were commonly used

DLP PROJECTOR
DLP stands for 'Digital Light Processing' and is a technology invented by Texas Instruments. The picture
in a DLP projector is produced by light reflecting off a Chip which has millions of tiny mirrors fixed on
it. This chip is commonly known as a 'Digital Micro mirror Device' or DMD. Each mirror in the DLP
projector's DMD Chip represents one pixel in the digital image, so for example, in a HD DLP DMD chip
there will be 1920x1080 or a little more than 2 million mirrors assembled on the tiny DLP DMD Chip.

LCD PROJECTOR
An LCD projector is a type of video projector for displaying video, images or computer data on a screen or
other flat surface. It is a modern equivalent of the slide projector or overhead projector

HEAD MOUNTED DISPLAY (HMD) / HEADGEAR


• A headgear is made up of two tiny display and sound systems that channel images and sound from
the source to the eyes and ears, thus presenting a stereo three dimensional sound effect in the
virtual world.
• The wearer may also put on a body suit that senses the body movement and relays the data into
the virtual reality system which in turn adjusts the position of the user in the system.

HEADGEAR

LED DISPLAYS
A LED display is a flat panel display, which uses light-emitting diodes as a video
display.
A LED panel may be a small display, or a component of a larger display.
They are typically used outdoors in store signs and billboards.

PRINTERS
• A printer is an output device that produces a hard copy output such as text and graphics on a
physical medium like paper.
• Printed information (hard copy) exists physically and in a more permanent form than a soft copy
on a display device.
• Printers with different speeds, features, quality, and capabilities are available in a range of
prices.Printers can be grouped into two categories: impact and non-impact printers.

IMPACT PRINTERS
• An impact printer forms characters and graphics on a piece of paper by a striking mechanism
against an ink ribbon that physically contacts the paper.
• Impact printers are noisy because of this striking activity.
• Large Businesses, use impact printers because these printers can withstand dusty environments,
vibrations, and extreme temperatures.
Commonly used types of impact printers include Daisy wheel, dot-matrix , Braille and line printers

DAISYWHEEL PRINTER
• This is a kind of impact printer where characters are arranged on the ends of the spokes of a
wheel.
• The wheel (usually made of plastic) is rotated to select the character to print and then an
electrically operated hammer bends the selected spoke forward slightly, squeezing in an ink ribbon
between the character and the paper, as in a typewriter.
• One advantage of this arrangement over that of a typewriter is that different wheels may be
inserted to produce different typefaces (font styles and sizes)
DOT-MATRIX PRINTER
• A dot-matrix printer produces printed images when tiny wire pints on a print head mechanism
strike an inked ribbon like in a type writer.
• When the ribbon presses against the paper, it creates dots that form characters and
graphics.Most dot-matrix printers use continuous-form paper, in which thousands of sheets of
paper are connected together end to end. The papers have holes along the sides to help feed the
paper through the printer. Dot matrix printers provide cheap but low quality printing.

BRAILLE PRINTERS
• A Braille printer, commonly known as a Braille embosser, is an impact printer, that renders text
as tangible dot cells which are felt and read by the blind.
• Using Braille translation software, a document can be embossed with relative ease and
efficiency.
• They need special Braille paper which is thicker and more expensive than normal paper.
• Once a copy produced, printing further copies is often quicker by means of a device called a
"thermoform", which produces copies on soft plastic.

LINE PRINTERS
• A line printer is a high-speed impact printer that prints an entire line at a time.
• The speed of a line printer is measured by the number of lines per minute (lpm) it can print.
• Some line printers print as many as 3,000 lpm.
• Mainframes, servers, or networked applications, such as manufacturing, distribution, or shipping,
often use line printers.

NON-IMPACT PRINTERS
A nonimpact printer forms characters and graphics on a piece of paper without actually striking the
paper.
Some spray ink, while others use heat or pressure to create images.
Commonly used nonimpact printers are ink-jet printers, laser printers, thermal printers, plotters, and
mobile printers

INK-JET PRINTER
• An ink-jet printer forms characters and graphics by spraying tiny drops of liquid ink onto a piece
of paper.
• Ink-jet printers produce text and graphics in both black-and-white and color on a variety of
paper types & sizes.
• The print head mechanism in an ink-jet printer contains ink-filled print cartridges.
• Each cartridge has very many small ink holes, or nozzles.
• The ink propels through a combination of the holes to form a character or image on the paper.
LASER PRINTER
• A laser printer is a high-speed, high quality nonimpact printer.
• Operating in a manner similar to a copy machine, a laser printer creates images using a laser
beam and powdered ink, called toner, which is packaged in a cartridge.
• When printing a document, laser printers process and store the entire page before they actually
print it. For this reason, laser printers sometimes are called page printers.
• Storing a page before printing requires the laser printer to have a certain amount of inbuilt
memory.
THERMAL PRINTERS
• A thermal printer generates images by pushing heated pins against a coated heat-sensitive
paper.
• The coating turns black in the areas where it is heated, producing an image.
• Basic thermal printers are cheap, but the print quality is low and the images tend to fade over
time.
• Thermal printing technology is, however, ideal for use in small devices e.g. ATM receipt printers.
PLOTTERS
• Plotters are printers used to produce large, high-quality, vector graphic drawings such as
blueprints, maps, posters, and signs.
• These printers are usually very costly, and are used in specialized fields such as engineering, and
graphic art.
• They use ink-jet printer technology, on a much larger scale, to print professional quality displays.

MOBILE PRINTERS
• A mobile printer is a small, lightweight, battery powered printer that allows a mobile user to print
from a notebook computer, Tablet PC, PDA, smart phone or other personal mobile device while
traveling.
• They fit easily in a briefcase alongside a notebook computer.
• Mobile printers mainly use ink-jet, thermal, wax-transfer, or dye-sublimation technology.
3D PRINTERS
• A 3D printer is a type of material design printer that designs and builds 3D models and products of
devices and components using an additive manufacturing process.
• 3D printers design three-dimensional prototypes and create the end product by directly building
them using computer aided design (CAD) or software-created 3D design diagrams, figures and
patterns.

LED PRINTER
• An electro-photographic printer that uses a matrix of LEDs as its light source. The LED mechanism
is much simpler than its laser printer counterpart. A stationary array of LEDs is used instead of
numerous moving parts, and the LEDs are selectively beamed onto the drum
DYE SUBLIMATION PRINTERS
• Dye sublimation is a printing process using a specially designed ribbon that holds solid inks. The
printer heats the ink, causing it to sublimate – which means it skips the liquid form and transitions
directly into a gaseous state
COMPUTER SOFTWARE
o Introduction to software
o System software
o Application software
SOFTWARE
Software is a collection of computer programs and related data that provides the instructions for telling
the computer what to do and when to do it. OR
This refers to a set of programs that controls the operations of the computer and its devices. It serves as
the interface between the user, the application software and hardware. They provide the facilities that
enhance the computer‘s general performance.

CATEGORIES OF SOFTWARE
Software is often divided into two categories:
1. Systems software: Includes the operating system and all the utilities that enable the computer to
function.

2. Application software: Includes programs that do specific work for users. For example word
processors, spreadsheets, and database management systems fall under the categories of applications
software,

CHARACTERIISTIICS OF A GOOD COMPUTER SOFTWARE


1. Maintainability: well-designed software should be flexible enough to accommodate future
changes that will be needed as new requirements come to light.
2. Correctness: Well-designed software should meet all the stated requirements.
3. Reusability: is ease with which software can be reused in developing other software. By
reusing existing software, developers can create more complex software in a shorter amount of
time.
4. Reliability: is the frequency and criticality of software failure. The criticality is measured by
the average time required for repair.
5. Efficiency: is the degree with which software fulfills its purpose without waste of resources
(like RAM, Storage, CPU & Network)
6. Portability: is the ease with which software can be used on computer configurations.
7. Robust or Stable: it should be stable even with unexpected conditions (like wrong input)
8. Data-protective: it should be able to protect information it is responsible.
9. Documentation: it should be accompanied by complete documentation
10. Speedy: it should be faster in accomplishing tasks (quick in processing)

Types of software
Software can be categorized in two (2) types:
 System Software
 Application software
System Software
System Software is computer software designed to operate the computer hardware and to
provide a platform for running application software and hardware.

Examples of system software include:


 Operating systems,
 Utility programs
 System development software (Programming languages).

The system software is installed on your computer when you install your operating system.
These programs are written by the computer manufacturers or professional programmers. Some of these
programs reside inside ROM are known as firmware. System software consists of:
1 .Operating System
2.Programming languages
3. Utility programs

FUNCTIONS OF SYSTEM SOFTWARE

 The common function of the software includes the following:

It is used for shutting down the computer and restarting it.


It helps to detect wrong commands
It is used for installing both the new hardware and the applications software
It helps in multi-programming
It controls all activities in the various parts of the computer.
It alerts the user and reports errors.
Provides memory space and programs for execution.
It helps to translate language: high level language codes into low, level language codes that the user can
understand e.g. compilers, interpreters, linkers and assemblers.
Formatting disks
Translating program instructions into machine language
Sorting data files
Transferring data between input and output devices
Executing and storing application programs
Storing and retrieving files
DIAGRAMMATIC ILLUSTRATION

COMPUTER SOFTWARE

OPERATING SYSTEMS (OS)


Operating systems software refers to a set of programs that coordinate the operation of all hardware and
application software components of a computer. These are programs responsible for the management
and coordination of processes and the sharing of the resources of hardware to make a computer easier to
use because they ‗insulate‖ the user from the hardware. When a computer is switched on, the OS
program runs and checks to ensure that all parts of the computer are functioning properly. Once coded,
the OS manages all activities on the computer and it operates with input and output devices.

Functions of operating system


 Resource allocation i.e. allocates processing time and memory to tasks like printing. Creates a
document, etc.
 It helps in hardware management like accessing disk drives, printers and key board.
 It helps in file management and serving the user from knowing where in memory his files are to be
stored.
 Coordinates the operation of all application software by enabling its interface between the computer
user and the computer.
 Helps in administering security to the computer.
 It monitors system performance.
 The operating system coordinates the operation of all hardware and application software components of
a computer.
 Data management
 Booting
 Spooling print jobs
 Memory management
Job (task management)
FUNCTIONS OF THE OPERATING SYSTEM
 Loading of programs and data files from the secondary storage to the memory when required.
 Control of hardware resources of a computer by allocating the use of peripheral devices
for example input, output, storage and processing devices.
 Protects hardware, software and data from improper use.
 Controls and interprets keyboard, mouse and other inputs.
 Controls the computer systems security for example by monitoring the use of passwords.
 It provides a computer user with an interface that enables him or her to easily manage, control
and operate a computer.
 It checks whether hardware is working properly, equipment malfunctioning and displays error
handling and correct messages.
 Keeping track and furnishing a complete record of all that happens during the processing.
 Responsible for starting a computer.
 Provides a means to establish web connections and some include a web browser and e-mail
program.
Responsible for administering security where administrators establish user accounts that require
a user name and password to access a computer system.
 Responsible for managing and monitoring directories and files stored and the disks.

Signs of a failed operating system


Frequent crashes: the os crashes or freezes regularly, leading to data loss
and productivity issues
Slow performance: the os takes a long time to boot, launch applications, or
perform tasks.
Error messages: frequent error messages or warnings appear, indicating
system instability
Device driver issues: hardware device malfunction or are not recognized due
to driver problems.
Incompatibility issues: the os is incompatible with new software or
hardware.
Corrupted system files: system files become corrupted, leading to instability
and errors.
Boot issues: the os fails to boot or experience prolonged boot times.
TYPES OF OPERATING SYSTEM
Single user
Single user operating system allows one user to login at a time. Examples include DOS and windows
98. It allows one operation at a time i.e. you can‘t start a document and open graphics to copy the
school budge at the same time.

Multi-user
It allows multiple users to log on to the system at ago. Examples are UNIX and LINUX. It allows users
to access the same data at the same time. It is tised in networking. Each person on the network appears
to be a sole user of the computer by allocating each user on a network at a time and when the time
elapses, the next person is given a go ahead.

Multi-tasking
This allows the computer to do more than one job at the same time. There is no time lag between the
different tasks e.g. One can type a document as he is printing at the same time.

Networked
This is an operating system that contains components and programs that allow a computer on a network
o serve requests from other computers for data and provide access to other resources such as printer and
file systems. Examples are Ms-windows 2000 server, Ms Windows 2003 server, UNIX and LINUX.

Standalone
Stand alone are usually not connected to a network and thus cannot access resources. Examples of
operating systems include; Disk Operating System (DOS), UNIX. Windows like windows 95,98.2000,
2003, XP, Vista.

NB:
The operating system commonly used on micro computers are; Ms [ and windows.

DOS i s a command driven user interface which has been described by many as not being a user
friendly program. It has a set of programs which help one to work with a computer effectively, merge
the information on the external storage device and carry out all housekeeping routines. It is used to
manage devices, command processing, control programs and manages system resources and errors.
Examples of DOS include Personal Computer Disk Operating System (PC-DOS) and Microsoft Disk
Operating System (MS-DOS).
Windows is a GUI (Graphical User Interface) operating system .it combines a number features e.g. It is
easy to make programs, easy to use. Its main aim is reliability and manageability with the help of active
directory Common examples include windows 2000.

Differences between DOS and Windows


Network operating system was designed to be used on several computers that exist on a network
although at times they can be installed on standalone computers. Common examples include Windows
NT 4.0, UNIX and Linux.
PDA operating system is specifically designed for handheld computers. They are pen driven or touch
sensitive and come already loaded in the computer‘s ROM-BIOS.

USER INTERFACES
When a computer is turned on, an interface is seen. This consists of the cursor, menus, icons etc. that
allow users to do things with the computer. A user interface can make a computer either easy or hard to
use.
In the designing of a user interface, sound, colors, graphics, position of items on the screen and
availability of help are considered.
Types of interfaces
1. Command Line Interface (CLI)
These accept commands in the form of special words or letters. The user types keywords or presses
special keys on the keyboard to enter data and instructions, It provides a virtually empty screen with
blinking cursor (prompt) where commands are keyed in and the computer executes them on pressing the
enter key.

DOS (CLI) WINDOWS (GUI)


Is a command — line interface that takes up
Is a graphical user interface that needs more
little memory and normally does not require a
memory as well as a faster processor
very fast processor.
Operations in a windows environment
Operations are fast because commands can be
depend on the powerfulness of the
entered directly through the keyboard.
processor
Many commands can be grouped together as a
It is difficult to automate, functions for
batch file so that repetitive tasks can be
expert users
automated
It is user friendly because it is easy to learn
Commands have to be learnt
and work with.
Commands need not be memorized because
Commands have to be memorized
they are represented in icons and pictures.

The commands are accepted and executed by a part of the operating system called the command
processor or command line interpreter. Command line software is more flexible but more difficult to
learn. Users must have knowledge of the available commands, what they do and the rules governing
how they should be typed. It is more suited for experienced users. Examples include: DOS, UNIX,
LINUX

2. Menu driven
There are many different menu forms that provide the user with a list of program commands displayed
on the screen and a simple means of selecting between them. It presents the user with a choice and does
not need one to remember the commands. It is suitable for beginners and infrequent users.

3. Graphical User Interface (GUI).


A GUI shows a user to use menus and visual images such as icons, buttons and other graphic objects to
issue commands. It provides a colored screen with icons each representing a program. A mouse may be
used. This allows the user to enter commands by pointing and clicking at objects that appear on the
screen. It makes the program easier to use. Examples include; windows (3.1, 95, 98, 2000, win XP,
Susie Linux, Novel Netware.

Components of GUI
Pointer: Is a symbol that appears on the display screen that is moved to select objects and commands. It
usually appears like a small angled arrow. A pointing device is a device such as a mouse that enables
the user to select objects on the display screen.
Icons: These are small pictures which represent commands, files or windows. A command can be
executed or turned into a window by moving the pointer to the icon and pressing the mouse button.
Window: Is a visual area containing a user interface that displays output and allows input to one or
more processes. The screen can be divided into different areas running different programs or displaying
a different file. Windows can be moved around the display screen and their shape and size at will.
Desktop: This is the area on the display screen where icons are grouped.
Menus: This is a program‘s list of user choices or possible actions usually shown on the screen. These
help in execution of commands by selecting a choice from the menu

PROGRAMMING LANGUAGES
This refers to the means of communicating with the processor or Programming languages are medium
used by man to write instructions that command the computer hardware to perform certain tasks. They
involve definition of a list of words and symbols according to a particular predetermined rule of
grammar (syntax) into a logical manner to form a computer program.

Categories of programming languages include the following:

LOW LEVEL LANGUAGES


Machine language
Machine languages are the only languages understood by computers.
These are programming languages that provide little or no abstraction from the computer‘s architecture.
They are called low level languages because they are closely associated with the processor.
They are two types of low level languages.
1. Machine code
2. Assembly code

MACHINE CODE
This is a low level language in which systems of impartibly instructions ara executed directly by a
computers CPU. Each instruction performs a very special task. This s a first generation language and
unfamiliar to humans it is not user-friendly at all. All instructions in machine code are represented in
the binary format e.g. 100100100010001 on a 16 bit machine. Machine code language is highly
efficient and allows direct control of each operation though it is difficult to read and debug, tedious,
time consuming, error prone and designed for a specific machine and microprocessor.

Advantages of machine code languages


 Are highly efficient
 They allow direct control of each operation

Disadvantages of machine code languages


 They are difficult to read and learn since programmers write computer programs using 0s and
1s.
 They are very unfamiliar to humans
 They are not user friendly at all.
 Programming in machine code is tedious; time consuming hence chances of errors are high.
 They are designed for a specific machine and specific micro processor.

ASSEMBLY CODE
Assembly languages have the same structure and set of commands as machine
languages, but they enable a programmer to use names instead of numbers.
This is a low level language in which each statement corresponds to a single machine language
instruction. They are always specific to certain computer architecture and allow the use of systematic
representation of machine codes. This was invented to assist machine code programmers. It is more
easily understood and remembered by humans e.g. SUB for subtract. FNO for first number. It has a
closer control over the hardware and executes efficiently but it is designed for a specific machine and
microprocessor.
Low level languages are closer to the hardware than are high level languages which are closerto
humans.

Advantages of assembly language


 This language was more understood and remembered by human beings.
 It has closer control over the computer hardware and executed very efficiently.
 It is useful for writing operating systems and game programs which require faster and
efficient use of the central processing unit.

Disadvantages of assembly language


 It depends on registers and memory locations in a computer so cannot be transferred from
computer to computer.

High level languages


These are programming languages that are easier to write and understand than low level
languages because they are closer to English but have to be converted into machine code before
being run.
A high-level programming language may be more abstract, easier to use, or more
portable across platforms.

Advantages
 The language is widely used
 It is machine independent
 Its English-like statements are easy to understand
 It can handle many files
 It has a pool of skilled programmers
 It can easily handle input/output operations
 It is portable

Disadvantages
 Its structure makes even simple programs long
 Since it is readable, it is wordy
 It cannot handle mathematical processing

HIGH LEVEL LANGUAGE (HLL) 3GLs


A high level language is an advanced computer programming language that is not limited to the
computer or for one specific job and is more easily understood. These were introduced as a further
refinement in the assembly language. They make programming much easier to use. In language, fewer
instructions are written and therefore a lot is done in less time. They are user friendly and problem
oriented since they involve wide vocabulary of words, symbols and sentences. They are used in
conjunction with their syntax. They are also called procedural languages or machine independent
languages or one-to-many languages.
There are over 500 high level programming languages which include the following:
COBOL: Common Business Oriented Language. This was designed for business and commercial
processing. COBOL is widely used because it is compatible to different types of computers and a pool
of skilled programmers.
FORTRAN: Formula Translation is usually used in processing numeric data in scientific and
engineering applications.
BASIC: Beginners All Purpose Symbolic Instruction Code. This can do almost all computer processing
tasks. It is used to teach students how to use computers.
PASCAL: This is used for teaching programming. It uses procedures and functions which allow a top-
down approach to solving problems.
HTML: Hypertext Markup Language is one of the main programming languages used to create web
pages for the Internet or intra nets.
JAVA: This is an object oriented programming language that displays graphics, accesses the network
and interfaces with users via classes that define similar states and common methods for an object‘s
behavior.

VERY HIGH LEVEL (VHLL) 4GL‘s (4 generation languages):


These are higher, easier and shorter than high level languages. They tell the computer what to do but
not how to do it i.e. they are non-procedural. They use menus and prompts to guide a non-specialist to
retrieve data with ease.
Examples include SQL (Structured Query Language), Oracle, RPG (Report Program Generator,
HTML, XHTML (Extended HyperText Markup Language). These were designed to make
programming much more easily.

NATURAL LANGUAGES 5GLs (fifth generation language):


These are in form of natural languages where the user enters his/her request in form of human speech
they are still undergoing development. These types of languages are normally used in intelligent based
systems (1 KS) such as robots. Examples include: V8 (Visual Basic), OB (Quick Basic). They
manipulate facts and rules to reach a conclusion.

OBJECT ORIENTED LANGUAGES


The current state of art in programming technology is object oriented language. Every object has its
own properties which can be set such as colour, size, data source etc.

WEB DEVELOPMENT LANGUAGES


They include HTML and JAVA that are most commonly used for creating web pages or the www.

LANGUAGE PROCESSORS
A language processor is a hardware device designed or used to process program code to machine code.
Language processors are mainly used with high level programming to work backwards to the processor.
Their main work is to translate high-level language codes into low-level language codes that the
processor can understand.
A translator on the other hand is a program that accepts text expressed in one language pd generates
semantically equivalent text expressed in another language.
Language processors include: Compilers, assemblers, interpreters and Linkers

Compilers
These translate a program written in high level language into machine code or into assembly code
program. The entire program is translated into machine code at compilation time. They do the
following:
• Allocate areas of main storage.
• Generates the object program on cards, tapes, or disc as required.
• Produces a print listing of the source and object programs when required.
• Tabulates a list of errors found during compilation e g the use of Words or statements not included in
the language vocabulary.

Assemblers
An assembly is a program that translates assembly language/instructions into binary code or machine
code, a format that is understood by the processor. They normal begin from where compilers stop. They
do the following:
 Assemblers allocate areas of storage.
 Detects and indicates invalid sources-language instructions
 Produces the object program on cards, tapes, or disc as required
 Produces a print listing of the source and object projects with comments
 Data may be added to tell which program may be executed when the assembly process is completed
 This program can only be executed when the assembly process is completed
 Translates mnemonic operation codes into machine code, and symbolic addresses into machine code

Interpreter
An interpreter translates high level instructions into an intermediate form which it then executes. The
source program is translated line by line while the program is running. As a result, a program running
under an interpreter runs very slowly as compared to a compiled program.
It does not need to go through the compilation stage, the interpreter immediately executes high level
programs and thus it is faster.

Linkers
These programs combine compiled programs and determine where the program will be located in
memory. When the linker has transformed an object code, an executable file is generated. This normally
results in files with the extension.

UTILITIES
A utility is a program that performs a specific task related to the management of computer functions,
resources or files like virus protection, memory management, password protection and file
compression. Utilities are also called service programs and they are used to enhance the performance of
the operating system. These programs are part of system software used to support, enhance and expand
existing programs in a computer system and make‘ it more and more user friendly. The most common
utilities include:
i. Debuggers: are used during the testing of programs and locating errors.
ii. Sorting utility: used for sorting data.
iii. Editors: for making changes, used for word processing.
iv. Resource: used in networks
v. Disk scanner utility: detects and corrects both physical and non-logical problems on storage devices.
vi. Disk defragmenter: it recognizes the files whose contents are broken and spread across several
locations on the hard disk and moves fragments to one location for efficiency.
vii. File compression utility: shrinks the size of the file which takes up less storage space. Compressed
files are sometimes called zipped files with a .zip extension.
viii. Cryptographic utilities: encrypt and decrypt streams and files.
ix. Spy ware remover: detects and deletes spy ware. Spy ware is a program placed on a computer to
secretly collect information without the user‘s knowledge.
x. Internet filters: remove or block certain items from being displayed.
xi. Merge utility: for merging or combining different files into one.
xii. A personal firewall: detects and protects a personal computer from unauthorized intrusions.
xiii. An installer utility: removes an application as well as any associated entries in the file system.
xiv. A backup utility: it allows a user to copy or back up selected files on to another storage disk.
xv. Data recovery utility: recovers accidental deleted files from your computer.
xvi. An antivirus utility: It prevents, detects and removes viruses from a computer memory or storage
device.
xvii. Screen saver utility: is a utility that causes the monitor‘s screen to display a moving image or
blank screen if no keyboard or mouse activity occurs for a specified period of time.
Screen savers were originally developed to prevent a problem called ghosting, in which images could
be permanently etched on a monitor‘s screen.

Screen savers can be used for reasons of security, prevent unwanted onlookers from accessing data or
information from your computer, for advertisements on the screen, for entertainment and also prevent
burn in.

Functions of utility programs


- To detect for and remove viruses by using Antivirus programs.
- They compact data with the aim of gaining space by use of data compression.
- To combine data from more than one file.
- To detect errors from hard disk and fix them.
- Takes in data and re-arrange it using sorting utility.
- backup data (safe keeping) by storing it on other facilities
- To recover the lost data due to power going off by using data recovery

APPLICATION SOFTWARE
Application software refers to related programs designed to perform a specific task to
solve a particular problem for the user. They are designed to solve practical problems
experienced in life.

Application package
This is a user software program designed to accomplish a given task.

Characteristics
 Targeted to wide range of users
 Easy to use-user friendly
 Designed for power and flexibility
 Machine independent

Software suite
This refers to the collection of individual applications sold as a single package.

The common software suites include:


 Microsoft office
 Lotus smart suite
 Corel word perfect suite
Advantages of software suites
 Cost significantly less than purchasing a single program
 Easy to use since applications inside use and share common features

Uses of application software


 Create graphics and multimedia projects
 Productive tool/business tool
 Support personal activities, business and education
 Facilitate communication

Features of application software include:


 Cursors
 Scrolling
 Menus
 Help screens
 Dialog boxes
 Special purpose and function keys
 Macros
 Tutorials and documentation

Application is software that enables a computer to perform a specific task or carry out a specific job.
The job is called an application. These programs make a computer perform different activities like or
uses like word processing, accounting, and graphics etc. They are called application programs because
they direct the processing required for the particular task of the computer. They include: word
processing, spreadsheets, databases, presentations, desktop publishing, graphics processing and
communication software.
Application software needs a particular hardware and operating system for their application. It is
divided into two categories:

Custom made/tailored/bespoke software/In-house


/tailored/intranet/homegrown
This is an application program which is designed and developed at a user‘s request to satisfy personal
data processing needs. It gives the user a chance to customize programs according to the suitable
environment e.g. stock control programs, library software, etc. This software is used to serve a
particular purpose and no other. Such software includes: school management system, banking system,
insurance system and payroll system.

Packaged/Off-the-shelf software/standardized/commercial/market-
available/pre-built/third-party
This is an application program which is copyrighted and designed to meet needs of a wide variety of
users. These are of general nature and solve needs which are common in nature.
They are already made programs designed to suite any environment and are bought from the shops and
then installed in a computer.

Advantages of off the shelf software


 They are usually provided with extensive documentation to help the user.
 They are easy to use and are suitable for people with little or no computing knowledge.
 They are appropriate for a large variety of applications
 They are relatively low priced since they are sold in large numbers.
 They are readily available
 They can be customized
 They have less errors
 They can be customized.
 They are Cheap

Disadvantages of off the shelf software


 The package may allow only clumsy solution to the task at hand.
 Some packages need developing for example databases so require thorough knowledge
that is quite expensive.
 The user has to provide documentation for the particular application created.
 It is easy to forget commands to use the package especially if it is not used frequently.

They categories of Off-shelf packages:


a) Word processing: This is used in the creation, editing, formatting, saving and printing of documents
such letters, reports, labels, poems, memos, newsletters etc., word processing applications include
Microsoft word, word pad, note pad, word star, word perfect, core! word, perfect writer, professional
writer. Etc.
b) Spread sheets: These are simple grids of cells arranged in rows and columns. They are used in
handling numeric data such as finance, planning, budgets, etc. They include Microsoft excel,
macromedia director, and lotus freelance, Lotus 1-2-3, Quattro pro, SuperCalc among others
c) Data bases: These are used in creation and management of large volumes of information related to a
particular topic or subject e.g. mailing lists, customers and supplies. They enable the user to work with
up to 15 files at once to manipulate, update and revise data to produce meaningful reports. Their power
comes from the ability to sort information through or from large volumes of information. Examples
include: My SQL, Ms Access, Oracle, Lotus approach, Fox pro, Sybase, postgre SQL.
d) Presentation software: This is used in creation of computer based slide shows, overheads, etc. using
sophisticated graphics styles, effects transitions and animations schemes. Examples include Ms Power
point, Freelance graphics, core! etc.
e) Desktop publishing: This is used to combine graphics to create a publication e.g. brocure, prospects,
booklets, business cards etc. they include adobe PageMaker, Microsoft publisher, Quark press, Adobe
InDesign, Serif PagePlus, Apple Page 2 among others. etc.
f) Graphics processing: These are used in the creation and editing of graphics ranging from charts,
representation graphs, paint and drawing. They include Photoshop, Microsoft photo draw, adobe
illustrator, Corel draw, etc.
g) Communication software: This is used in exchange of messages by sending and receiving data via
computers to different areas of the world, They include software browsers like Netscape, Microsoft
navigator, internet explorer etc.

2. Freeware
This is copyrighted software provided at no cost to users e.g. games like solitaire and Dave, antivirus
software like
AVG.

3. Shareware
This is copyrighted software distributed free for the trial period and payment is required for continued
use after the trial period e.g. Motorbikes, computer car driving simulations, VS NET, antivirus software
like MacAfee.

4. Public domain software


This is free software donated for public use with no copyright restriction e.g. parliament news,
newspapers like new vision and monitor.

Word processing
Word processing software also known as a word processor is used to create, edit, format , save, and
print documents that contains text and graphics.

Popular word processing software:


 Microsoft word  Lotus word pro  Corel word perfect

Others include;
 MultiMate  Professional writer  Word star
 Perfect writer  Word perfect

ADVANTAGES OF WORD PROCESSINGSOFTWARE OVER ORDINARY TYPEWRITER:


 Easy and fast to make changes to the documents.
 Has many look features to create document that looks professionally and visually appealing.
 Documents can normally be previewed before being printed.
 Documents can be saved for future use and editing.
 Convenient to create forms letters and mailing labels.
 The quality of the final text is heater, character style can be changed.
 Prevents unnecessary duplications of documents when changes have to be made, because it is not
necessary to retype the document.

DISADVANTAGES OF WORD PROCESSING SOFTWARE


 Expensive equipment is needed.
 Working knowledge of word processing is essential
 Impractical for short text
 Information can be lost because of power failure and if a disk is damaged.

Differences between operating a word processor and an ordinary typewriter


 A word processor prints the entire documents at a time which an ordinary typewriter prints one
character at a time.
 A word processor automatically moves the cursor to the beginning of the next line when text extends
beyond the right page margin while the user needs to advance the lever manually when using an
ordinary typewriter.
Text editors
These are simple word processors which are generally used to type without any special formatting .
Text editors are mainly used to write small notes, memos and programs.
Creating a document involves entering text or number or symbols, inserting graphics, and performing
other task using an input device such as keyboard or mouse

Editing
This is the process of making changes to the existing content of the document.

COMMON EDITING FEATURES


Inserting; When text is inserted or added to a document, the surrounding words automatically move to
make rooms for inserted text.
Deleting; when text is deleted or removed from a document, the surrounding words automatically move
to fill the gaps left by the deleted text.
Cutting; when text is cut, it is stored in a temporary location called the clipboard. However, the original
is removed from its place.
Copying; when text is copied, it is a duplicate and stored in the clipboard. However, the original text
remains in place.
Pasting; when text is pasted, it is placed from the clipboard in the document.

Formatting;
Formatting involves changing the appearance of a document. There are four different levels of
formatting;
 Character formatting  Section formatting
 Paragraph formatting  Document formatting (formatting page)

Character formatting;
Involves changing the font type, font size or font style. The most common way to emphasize text is to
apply bold face, italic or underline character forming styles.

Paragraph formatting;
This involves text alignment, lines spacing, indentation s, tab settings, and borders.
A paragraph can be a single line of text or an entire page, and may be formatted independently from the
rest of the document.

Section formatting;
This lets you specify page numbers, headers and footers for different sections or computers of a
document.

Document formatting (forming pages):


This one specifies the overall page layout for printing .formatting at this level includes choosing the
paper size (letter, legal, A4,A3), page orientation (portrait or landscape) and also involves changing the
margins left, right, top, and bottom )or the distance between the main body of text and the edge s of the
paper.

Undo;
This one allows actions that have been performed to be reversed such that if some text was accidently
deleted, then the action can be undone.

Saving;
This is the process of copying a document from the memory to a storage medium such as floppy disk or
hard disk.

NOTE:
Any document can be saved and exist as a new file, which is a named as collection of data, instructions
or information.

Printing;
This is the process of sending a file to a printer to generate output on a medium such as a paper.
Popular features of word processing software includes (characteristics)

Word wrap;
This is the term used to describe a situation where the cursor automatically jumps to the next line. It
allows a user to type continually without pressing the enter key at the end of each line.

Find and search;


This feature allows a user to locate all occurrences of a particular character, word or phrase.

Replace;
This feature allows the user to substitute existing characteristics, word, or phrases with new ones.

Spelling checker;
This allows the user to check the spelling of a whole document at one time or to check and even correct
the spelling of individual words as they are typed (ie Auto correct)

Grammar checker;
Reports grammatical errors and suggest ways to correct them.

Thesaurus;
This suggests alternative words with same meaning (ie synonyms for use in the documents).

Mail merge;
Create form letters, mailing labels, and envelopes‘. Used when similar letters have to be sent to several
people. The names and addresses of each person can be merged with one single document and then
printed out.

Automatic page numbering;


Numbers the pages automatically in a document.
Tables;
Allows a user to organise information into rows and columns.

Macros;
Allows a user to record or save frequently used key strokes and instructions, which can be executed
later by running the corresponding macros.
Multi-columns;
This arranges text in two or more columns that look similar to a newspaper or magazine.

Clip art gallery;


Allows a user to insert drawings, diagrams and photographs into a document.

Mathematical formulae types setting;


Allows a user to type and set complex mathematical formulae within the program.

Template;
Allows a user to create documents, which are frequently used.

Printing ;
Allows a user to print single or multiple copies, fully or part of a document.

PRESENTATION SOFTWARE
This is an application program that allows users to create a variety of visually appealing slides that are
used to help further communication ideas. OR
It is an application software that enables users to create computer – based slide shows using
sophisticated graphics and animations to enhance images.
A presentation is the collection of slides handouts, speakers note and outlines in a single file.
These applications are also able to create slide shows are normally employed during meetings or
seminars to enhance speakers or presenters‘ ideas graphically.
Presentation software (sometimes called "presentation graphics") is a category of application programs
that are used to create visual presentations. These presentations are usually delivered in a slide show
format, and can be created with a variety of programs. The programs make it possible to combine text
and graphic elements to convey important information to a group of people all at once.
Each presentation software allows users to develop a slide show presentation; however, the methods for
viewing the presentation may vary from program to program. Both the PowerPoint® presentation
software and the Impress programs allow for the presentation to be viewed full screen on a computer
monitor, where the presenter can either have slide changes timed, or click through them. The
presentation can be moved to a larger screen by connecting the monitor to another screen.

Examples of Presentation software are;


 Microsoft power point  OpenOffice.org ImpressApple  Hewlett PackardBruno
 Corel presentation Keynote (software)
 Lotus freelance graphics  Corel Presentations  Graphics (obsolete)
 Macromedia director  IBM Lotus Freelance  Kingsoft Presentation
 Adobe works CustomShow  PresentiaFX
 Screen cast  Google Docs (web-based)  Prezi
 Microsoft PowerPoint  Harvard Graphics (obsolete)  SlideRocket
 SlideWiki

Functions of presentation software


Basically the following are the functions of presentation software.
- It helps you to organize and present information to an audience.
- It provides tools that help you outline your thoughts, build a presentation quickly using professionally
designed templates.
- It is used to enhance your presentation with pictures, charts, sound and video.

Features and terms associated with presentation software;


Slides:
A slide is an individual page in your presentation. You can output the slides on your printer as overhead
transparencies.

Handouts:
A handout consists of two to six slide images on a single page. Handouts help to support your
presentation by keeping the audience focused on what you are saying.

Outline:
For brain storming and organizing your thoughts. The text of your presentation i.e. headings and main
body text appears without the slide‘s background, colours and graphics.

Transitional looping:
It is a facility which sets up the presentation to run continuously until is stopped by the presenter.

Templates:
A template is a pre – designed presentation that defines what your presentation will look like, where
text and other objects will appear and which foreground and background colours will be used.

Auto features.
These features make it easier for you to perform your work e.g. the auto clip art command.

Wizards.
Power point employs many wizards which make short order of the tasks that might otherwise be
repetitive, time consuming or difficult.

The office assistant.


This is a feature that;
- Analyses your request and provide a resource list of potential help topics.
- Provides step – by – step instructions on how to complete a task and even perform certain tasks for you.

Auto content wizard.


This is a presentation design wizard that contains data from which one can select and edit to create
customized/personal presentation.

Place holders
These are boxes with dotted borders that one part of most slide layouts.
These boxes hold title and body text or objects such as charts, tables and pictures.

Action buttons:
These are buttons that is used in presentation software as hyperlinks to navigate the presentation.

Examples of Action buttons:


 Forward  Home
 Backward  Previous
Slide master;
This is a single slide that controls all other slides in a given presentation.
Any change made to it affects the rest respectively.

Multimedia:
Refers to audio, video, charts, pictures that are used in slide presentation.

NB:
Slide mode of printing involves:
Printing each slide on its separate page while handout mode of printing, lets you print your desired
number of slides on one page.

Application of presentation software.


There are various circumstances in which a presentation is made. These include;
- Teaching/lecturing a class
- Preaching the word of God
- In seminar discussions
- Introducing a product to sale
- Explaining an organizational structure.

Microsoft power point


This is a presentation software program used to perform computer based presentations. In other words,
it is a powerful tool used to create professional looking presentations and slide shows.

Starting Microsoft power point 2007


Just like all the application programs Microsoft power point is started or launched as follows;
- After your computer has been started. - Select Microsoft office
- Click on the start button - Choose Microsoft Office power point
- Move to all programs 2007.

Note:
Power point starts running on your screen once you click on it, with a title slide as the default slide
layout. But one can easily change to any other layout depending on the question.

Features associated with Microsoft power point window 2007.


When Microsoft power point is launched the following features will be seen on the screen.
- The Microsoft office button - Rulers
- The quick access tool bar - Slides, place holders, and notes.
- The title bar - Status bar, tabs, view buttons and more.
- The ribbon

Types of views in Microsoft Power Point provide different layouts for constructing and viewing your
presentation. These include;
- Normal view - Outline view - Slide show view
- Slide view - Slide sorter view - Notes pages view

Normal view;
Here the screen is split into three sections, showing presentation outline on the left, the active slide in
the main window and the notes at the button.

Slide view:
The slide view displays each slide on a screen and is helpful for adding images, formatting text and
adding background styles.

Outline view;
The presentation outline is displayed on the majority of the screen with small windows for the slide and
notes. This enables one to edit and display all presentations text in one location instead of one slide at a
time.

Slide sorter view;


Here, a small image of each slide in a presentation is displayed on one page. This can be very helpful
when you want to arrange and sort slides.

Notes Pages View;


This enables one to create and edit notes for the presenter‘s speaker.

Slide show View;


It displays one‘s slides in sequence, moving from one slide to another, transitioning (changing) with
special effects that one has setup and moving at a present timing that one can control.

Terms used in slide show;


i. Transitional effect;
These are different styles in which slides come and leave the screen during a presentation. It also
includes timing, mouse click, transitions sound effects.

ii. Timing;
Refers to the technique by which slides or text appear on screen during a presentation. (Mouse click or
automatic)

Slide master layout;


This is a term used/applied to a presentation‘s overall design.
i.e. it is a single slide that controls all other slides in a given presentation. Any change made to it affects
the rest respectively.

Slide layout.
This is a given design of slide showing divisions or areas or sections of a slide where work can be done.

Examples of layouts in Ms. Power Point presentation software such as Microsoft power point provides
a number of slide designs that one can use to come up with him or her presentation. These include;
- Title slide - Comparison - Blank
- Title and content/bulleted list - Title only - Content with caption.
- Two content/two column - Section header - Picture with caption.

Creating your first power point presentation..

Advantages of presentation software


 Presentation software is incredible easy to learn how to use.
 It is supplied with a large library of background templates and custom layouts
 Multimedia can easily be added to the presentation
 Presentations are easy to edit
 Presentations can be easily output to different formats e.g. interactive whiteboard, acetate slides,
handouts
 Excellent for summarising facts
 Great for showing graphs/charts/diagrams to an audience
 Can create a set of handouts for people to write on whilst presentation being given
 Allows you to face your audience and make eye contact rather than facing the screen.

Disadvantages
 It is difficult for the audience to take notes while the presentation is taking place, otherwise they lose
concentration
 Audiences are often happy to sit placidly and not interact with the presenter
 Not good for presenting certain kinds of information such as complex math equations
 It is all too easy to make a very bad presentation with too many animation effects and too much text,
images
 Presenters often just read from the presentation which is boring for the audience.

ELECTRONIC SPREAD SHEETS (MIS)


The electronic spread sheets are some of the management information system (MIS) tools for policy
analysis due to their speed, efficiency, flexibility and functionality that meet the needs of various users
like the policy managers.
Electronic spread sheet replaced paper version of work sheets. They have a lot of advantage such as the
ability to carry out calculations automatically.
This ability can save the user aright time of furious arithmetic.

Examples of spread sheet program


 Microsoft Excel  Frame work  Visual calc
 Lotus 1-2-3  Microsoft work  Quattro program

SPREAD SHEET APPLICATIONS


These programs can be applied in the following financial applications.
Budget planning Interest schedules.
Analysis of financial data Non-financial applications
Production of invoice and statements Recording students marks
Tax tables Mathematical evaluations

Advantages of Electronic spread sheet program


 Repeated calculations can be done easily with the facility to copy formula
 Data stored can be easily retrieved
 A spread sheet can be printed in part or in full.
 Spread sheet can be easily edited with the help of the insert, delete and formatting facilities.
 Spread sheet information can be transformed to other application program such as Microsoft word.
 If one value in a spread sheet is changed all the values of formulas relating to it automatically change.
 Once a model of a spread sheet has been entered it is only necessary to change the data to obtain a new set
of results.
 Many built in mathematical statistical and financial functions available.

Disadvantages of spread sheets


The staff must be trained to enter band edit spread sheets.
Only a fraction of the spread sheets can be seen at any given moment.
It is expensive in terms of equipment used.

Spreadsheet Terms
Like all other areas of computer technology, Microsoft Excel worksheets have their own "language."
This list of common terms is provided to serve as a reference for you as you work in Excel.
Cell
The intersection of a column and row. Information is stored in cells.

Cell Pointer
The cell pointer is similar to Word's insertion point. It selects or marks the current cell (where the next
activity is going to take place). The Excel pointer changes shape depending on location and
corresponding function. For more information, refer to Pointer Shapes above.

Cell References
The address, consisting of the column and row IDs, of a specific cell. The current cell location is
displayed in the upper left corner of the worksheet.

Column
A vertical group of cells within a worksheet.

Formula
A set of instructions which perform a calculation based on numbers entered in the cell or numbers
entered in other cells (referred to by cell references). All formulas begin with the equal sign (=).

Function
A pre-programmed formula. The function performs the calculation based on the cells referenced in the
function. All functions begin with the equal sign (=).

Range
A group of cells. Ranges are often referenced for formulas, printing, and designating information to be
copied or cut. Ranges can be selected by clicking and dragging over the cells.

Row
A horizontal group of cells within a worksheet.

Value
A number that can be used in an Excel calculation.

Workbook
A collection of worksheets contained within a single file.

Worksheet
A single layer or single sheet within the workbook. A worksheet can contain data, charts, or both.
Instead of compiling all of your information into one worksheet, you can create several worksheets
within the one workbook file. With this organization, similar information is grouped together to make it
easier to locate and use. The worksheets for your workbook will vary based on its content and purpose.

EXAMPLE: If you want one file containing the grade books for all sections you teach, each section can
be on a separate sheet.

NOTE:
The terms worksheet and spreadsheet are often used interchangeably.

Common mistakes in Microsoft Excel formulas


Whenever a mistake is made in a formula, Microsoft Excel displays an error message. Excel also tries
to place the cursor on or to the mistake on the line that contains the error

Common mistakes done in Microsoft Excel.


These include;
 The name of the function is miss pelt
 There being excess spaces in the name of the function and the first bracket (parenthesis)
 There being no similar numbers of left parenthesis and right parenthesis
 Multiple arguments not being separated by commas
 You have entered the correct number of arguments in an incorrect order
 Invalid characters being placed where an operator is expected

Error values
Microsoft excel displays an error value in a cell when it cannot calculate the formula for that cell
Error values Meaning
#Div/0! The formula is trying to divide by zero (0)
#N/A! No value is available
#Name? Microsoft excel does not recognize a name used in the
formula
#Null! You specified an intersection of two areas that don‘t intersect
Num! There is a problem with the number
#REF! The formula refers to a cell that is not valid
#VALUE! An argument or operator is on the wrong type

RELATIONAL DATABASE MANAGEMENT SYSTEM:


A RDMS is a type of software that enables one to create manipulate and query a data base. i.e. a
program that enables you to manage data. These programs enable the user to store large amount of data
that can be easily retrieved and processed with great flexibility to produce meaningful managements
report.

Examples of Data base programs


 Micro soft Access  D base  My sql
 Oracle  Lotus approach
 Fox pro  Paradox

Database Functions
There are several functions that a DBMS performs to ensure data integrity and consistency of data in
the database. These include the following;
 Data dictionary management
 Data transformation and presentation
 Security management
 Multiuser access management
 Data integrity management
 Database access languages and application programming interface
 Backup and recovery management
 Database communication interfaces,
 Transaction management
 Data storage management.

MS. ACCESS
MS. Access is one of the most common database programs on market. Ms. Access which comes as part
of MS. Office first appeared as Ms.access 2.0. With the up grading of various applications programs
Ms. Access was up graded to Ms. Access 97, Ms. Access 2000, MS. Access XP, MS. Access 2007, MS.
Access 2010 and MS. Access 2013.

TERMS ASSOCIATED WITH MS. ACCESS (Data base program)


Name sex District Allowance

Richard M Kampala 100,000

Martin M Mpigi 120,000

Mary M Soroti 240,000

Jack M Lira 321,000

Justin F Apac 380,000

Data base:
This is a collection of related information stored for a particular purpose. The data in the data base is
arranged in column and rows.

Field:
This is the entire column that contains similar data items. e.g. the names column in the table above
contains each individual name.

Record:
It is asset of the entire data items in the row. In other words a record is a collection of different fields in
particular table .e.g. . If you are to consider the data item in the second row in the table above this
contains all the information concerning Richard.

Field Name:
A field name is a file of particular column (field) e.g. sex, District, Names, and allowances are field
names.

Field Properties:
A field property is a characteristic of a particular field. The field properties are normally specified
from the general tab of the data table structure.

Field type (Data type):

This specifies the specific, data item stored i.e. field can either be text, Number, Date/time, currency,
Auto number, OLE object, hyper link.

Data Tables:
There are the fundamental structures in Ms. Access data base.

Queries:
These are tools used to manipulate data in t5he data tables i.e. they do operation tasks like how many
people are male and live in Kampala.

Macros:
This is an automated procedure of action in a computer. It is also called a main program because it has
short automated procedures which consist of simple commands.

Modules:
These are Microsoft access objects that enable the users to work processes. Just like macros they
provide work process von the specific commands.
Unlike macros, modules need one to have a good back ground in the programming languages and
preferably in Ms. Visual BASIC.

REPORT:
These are tools in access that enables one to preview and print data in a meaning full format.

Forms:
These are tools in MS. Access that enables one to enter and display records from the data base tables
registration forms, data words, receipts.

Foreign Key
This is a field in a relational database record that points to a key field in another table or a column in a
table that match the primary key in another table within the same data store.

Primary Key
This is a feature in database programs that uniquely identify a record. In other words,

Functions of a Primary key

CREATING A NEW DATA BASE IN MICRO SOFT ACCESS


(Using MS. Access 2007)
To create a new data base follow the steps below.
Start MS. Access by clicking on the start button ,move to all programs and click on it
Click on Microsoft Office
Click on Microsoft Office Access 2007
Click on blank database
In the file name text box, type in the suitable name for your database.
Specify the folder or drive where you want your database to be saved or stored.
Click on OK button
Finally, click on Create for the database to be created.

Categories/Types of Databases that can be created


There basically two (2) types of databases that can be created i.e.
 Flat Database
 Relational Database

Flat Database
This is one that only contains a single table of data. In other words, all of the data in database is stored
in this one place.

Relational Database
A relational database is one that contains two or more tables of data, connected by links called
relationships.

OBJECTS IN DATA BASE PROGRAM (MS.ACCESS)


These are tools that are used to manipulate data in data base programs.
They include the following;
 Queries  Report  Macros
 Forms  Pages  Modules

Advantages
 Reduced data redundancy
 Reduced updating errors and increased consistency
 Greater data integrity and independence from applications programs
 Improved data access to users through use of host and query languages
 Improved data security
 Reduced data entry, storage, and retrieval costs
 Facilitated development of new applications program

Disadvantages
 Database systems are complex, difficult, and time-consuming to design
 Substantial hardware and software start-up costs
 Damage to database affects virtually all applications programs
 Extensive conversion costs in moving form a file-based system to a database system
 Initial training required for all programmers and users
RELATIONAL DATABASE MANAGEMENT SYSTEM:
A RDMS is a type of software that enables one to create manipulate and query a data base. i.e. a
program that enables you to manage data. These programs enable the user to store large amount of data
that can be easily retrieved and processed with great flexibility to produce meaningful managements
report.

Examples of Data base programs


 Micro soft Access  D base  My sql
 Oracle  Lotus approach
 Fox pro  Paradox

Database Functions
There are several functions that a DBMS performs to ensure data integrity and consistency of data in
the database. These include the following;
 Data dictionary management
 Data transformation and presentation
 Security management
 Multiuser access management
 Data integrity management
 Database access languages and application programming interface
 Backup and recovery management
 Database communication interfaces,
 Transaction management
 Data storage management.

MS. ACCESS
MS. Access is one of the most common database programs on market. Ms. Access which comes as part
of MS. Office first appeared as Ms.access 2.0. With the up grading of various applications programs
Ms. Access was up graded to Ms. Access 97, Ms. Access 2000, MS. Access XP, MS. Access 2007, MS.
Access 2010 and MS. Access 2013.

TERMS ASSOCIATED WITH MS. ACCESS (Data base program)

Name sex District Allowance

Richard M Kampala 100,000

Martin M Mpigi 120,000

Mary M Soroti 240,000


Jack M Lira 321,000

Justin F Apac 380,000

Data base:
This is a collection of related information stored for a particular purpose. The data in the data base is
arranged in column and rows.

Field:
This is the entire column that contains similar data items. e.g. the names column in the table above
contains each individual name.

Record:
It is asset of the entire data items in the row. In other words a record is a collection of different fields in
particular table .e.g. . If you are to consider the data item in the second row in the table above this
contains all the information concerning Richard.

Field Name:
A field name is a file of particular column (field) e.g. sex, District, Names, and allowances are field
names.

Field Properties:
A field property is a characteristic of a particular field. The field properties are normally specified
from the general tab of the data table structure.

Field type (Data type):

This specifies the specific, data item stored i.e. field can either be text, Number, Date/time, currency,
Auto number, OLE object, hyper link.

Data Tables:
There are the fundamental structures in Ms. Access data base.

Queries:
These are tools used to manipulate data in t5he data tables i.e. they do operation tasks like how many
people are male and live in Kampala.

Macros:
This is an automated procedure of action in a computer. It is also called a main program because it has
short automated procedures which consist of simple commands.

Modules:
These are Microsoft access objects that enable the users to work processes. Just like macros they
provide work process von the specific commands.

Unlike macros, modules need one to have a good back ground in the programming languages and
preferably in Ms. Visual BASIC.

REPORT:
These are tools in access that enables one to preview and print data in a meaning full format.

Forms:
These are tools in MS. Access that enables one to enter and display records from the data base tables
registration forms, data words, receipts.

Foreign Key
This is a field in a relational database record that points to a key field in another table or a column in a
table that match the primary key in another table within the same data store.

Primary Key
This is a feature in database programs that uniquely identify a record. In other words,

Functions of a Primary key

CREATING A NEW DATA BASE IN MICRO SOFT ACCESS


(Using MS. Access 2007)
To create a new data base follow the steps below.
Start MS. Access by clicking on the start button ,move to all programs and click on it
Click on Microsoft Office
Click on Microsoft Office Access 2007
Click on blank database
In the file name text box, type in the suitable name for your database.
Specify the folder or drive where you want your database to be saved or stored.
Click on OK button
Finally, click on Create for the database to be created.

Categories/Types of Databases that can be created


There basically two (2) types of databases that can be created i.e.
 Flat Database
 Relational Database

Flat Database
This is one that only contains a single table of data. In other words, all of the data in database is stored
in this one place.

Relational Database
A relational database is one that contains two or more tables of data, connected by links called
relationships.

OBJECTS IN DATA BASE PROGRAM (MS.ACCESS)


These are tools that are used to manipulate data in data base programs.
They include the following;
 Queries
 Forms
 Report
 Pages
 Macros
 Modules
Advantages
 Reduced data redundancy
 Reduced updating errors and increased consistency
 Greater data integrity and independence from applications programs
 Improved data access to users through use of host and query languages
 Improved data security
 Reduced data entry, storage, and retrieval costs
 Facilitated development of new applications program

Disadvantages
 Database systems are complex, difficult, and time-consuming to design
 Substantial hardware and software start-up costs
 Damage to database affects virtually all applications programs
 Extensive conversion costs in moving form a file-based system to a database system
 Initial training required for all programmers and users

SYSTEM AND DATA SECURITY


System security/ cyber security/computer security
System security refers to the measures and precautions implemented to protect computer
systems, networks, and data from unauthorized access, attacks, damage, or disruptions.
System security is the protection of computer systems, data and information from harm, theft and
unauthorized access.

Key aspects in system security (goals of computer security)


The CIA triad is a fundamental concept that outlines three core principles to achieve the overall
security goals within a computing system. The CIA triad stands for:
1. Confidentiality:
Definition: Confidentiality ensures that information is accessible only to those who
areauthorized to access it. It involves protecting sensitive data from unauthorized
disclosure.
2. Integrity:
Definition: Integrity ensures the accuracy and reliability of data throughout its lifecycle.
It involves protecting data from unauthorized modification, deletion, or tampering.
3. Availability:
Definition: Availability ensures that information and system resources are accessible and
usable by authorized users when needed. It involves preventing and mitigating
disruptions to srvices.
Computer Securityrisk
A computer security riskis any action or event that may cause harm to computer hardware,
software, data, or information.

Categories of computer security risks


Computer security risks are broadly categorized into;
1. Physical security risks
2. Data / inforation security risks

Physical securityrisks.
A computer physical security risk refers to a threat or potential danger to the physical componets
of a computer systemnetwork infrastructure, or related hardware.
Some of the potential physical security risks include;
1. Hardware Theft:
 Description: this is stealing of computers, servers, or other hardware
components.
2. Hardware Vandalism:
 Description: this is the deliberate destruction of computer equipment either by
internal or external individuals.
3. Environmental Hazards:
 Description: Risks posed by environmental factors, such as floods, earthquakes,
or other natural disasters that can damage or destroy computer equipment.
4. Power Failures or Fluctuations:
 Description: Risks related to power supply issues, including power outages,
surges, or fluctuations that can damage hardware components or lead to data loss.
5. Fire Outbreaks:
 Description: Uncontrolled fires can pose a serious threat to the physical
infrastructure of computer systems, including servers, data centers, and other
hardware components.

Prevention of physical security threats/ risks.


Physical security risk Prevention measures
Hardware theft Use physical access controls such as locked
doors, windows, etc.
Use cables to lock equipment on desk e.g.
keyboard locks
Use alarm systems to warn in case of
intrusion
Put bulgar proofing in windows
Hiring security guards
Hardware vandalism Monitoring using CCTV cameras
Limit access to equipment
Environmental hazards For cases of lightening, have a lightening
conductor
The computer laboratory should be on a
raised ground in case of floods.
Power failures Using uninterruptable power supply (UPS) to
provide power backup in case of outages.
Using surge protectors to protect computer
equipment in cases of electrical spikes
Using power stabilizers in case of voltage
fluctuations.

Fire outbreaks Having a fire extinguisher to put out any fires.

Data security risks


A computer data security risk refers to a threat or potential danger to the data and information of
a computer system.
Some of the potential data security risks include;
1. Viruses:
 Description: Viruses are malicious software programs that disrupt the normal
functioning of a computer.
 Categories of computer viruses
Worm: A worm is a type of computer virus that reproduces itself continuously
until it the computer runs out of memory.
Trojan horse: A Trojan horse is a deceptive type of malware that disguises itself
as a legitimate or beneficial program but actually contains malicious code.
Boot sector virus: A boot sector virus infects the master boot record (MBR) or
the boot sector of a computer's hard drive or removable storage.
Joke: A joke is a harmless program that displays annoying messages on the
screen.
 Sources of computer viruses
o Fake games, o freeware from the
o pirated software, internet,
o infected storage o infected software
devices, installers,
o rogue sites, o infected email
attachments
 Signs and symptoms of computer viruses
o Flickering of the o Reduction in
screen computer memory
o Un usual messages on o Reduction in
the computer screen computer speed
o Programs taking o Missing computer
longer to open icons
o Corrupted files o Frequent system
o Failure to boot crashes
 Prevention of computer viruses
o Install an updated antivirus
o Scan all removeable devices
o Handle email attachments with caution
o Use a firewall
o Make regular data backups
o Avoid visiting rogue sites
2. Unauthorized Access:
 Description: Unauthorized access refers to individuals gaining access to an
organization's data, networks, endpoints, applications or devices, without
permission
3. Hacking:
 Description: Hacking involves gaining unauthorized access to computer systems
or networks with the intent to exploit vulnerabilities, disrupt services, or steal
data.
4. Cracking:
 Description: Cracking is the process of bypassing software licensing restrictions
to gain unauthorized access to software or systems.
5. Phishing:
 Description: Phishing is a form of social engineering where attackers use
deceptive emails, messages, or websites to trick individuals into providing
sensitive information.
6. Eavesdropping:
 Description: Eavesdropping involves the unauthorized interception and
monitoring of communication, often over networks, to gain access to sensitive
information.
7. Electronic Fraud:
 Description: Electronic fraud includes various deceptive practices conducted
online to trick individuals or organizations into providing money, sensitive
information, or access credentials.
8. Spoofing:
 Description: Spoofing involves impersonating a trusted entity or manipulating
data to deceive individuals or systems.
9. Denial of Service Attack (DoS):
 Description: Denial of Service attacks overwhelm a system, network, or service
with excessive traffic, rendering it unavailable to legitimate users.
10. Sabotage:
 Description: Sabotage involves intentional actions to disrupt, damage, or destroy
computer systems, networks, or data.
11. Backdoor Attacks:
 Description: Backdoor attacks involve creating secret access points (backdoors)
in systems, allowing unauthorized entry at a later time.
12. Information theft
 Description: Information theft refers to the unauthorized and intentional act of
stealing or acquiring sensitive information from individuals, organizations, or
systems.
13. Software piracy
 Description: This is illegal duplication of copyrighted software.

Prevention of data security risks.


1. Passwords:
 Description: Passwords are a fundamental authentication method where users
must provide a unique combination of characters to access a system or data.
Strong, complex passwords enhance security by making unauthorized access
more difficult.
 Characteristics of a good password
(i) It should have a minimum of 8 characters
(ii) It should a mixture of different characters
(iii) It should expire (Always change your password)
(iv) It should easy to remember
(v) It should be about your personal information
Note: A username is a unique public identifier chosen by an individual to represent their
identity when accessing a system while A password is a private string of characters
(letters, numbers, and/or symbols) chosen by a user to prove their identity when logging
into an account or system.
2. Firewalls:
 Description: Firewalls are network security devices that monitor and control
incoming and outgoing network traffic based on predetermined security rules.
They act as a barrier between a secure internal network and untrusted external
networks, preventing unauthorized access and protecting against cyber threats.
3. Biometrics:
 Description: Biometrics involves using unique physical or behavioral
characteristics for user authentication. Common biometric methods include
fingerprint scans, retina or iris scans, and facial recognition. Biometrics adds an
extra layer of security by relying on individual biological traits.
4. Antivirus:
 Description: Antivirus software is designed to detect, prevent, and remove
malicious software (malware) such as viruses, worms, Trojans, and ransomware.
It regularly scans systems for potential threats and takes action to neutralize or
quarantine them.
5. Data Backups:
 Description: Data backups involve creating duplicate copies of important
information to ensure its availability in the event of data loss, corruption, or
system failures. Regular backups provide a means of restoring data to a previous
state.
6. Access Rights:
 Description: Access rights, also known as permissions, define the level of access
and actions users or systems are allowed to perform on data or within a system.
Properly managing access rights helps prevent unauthorized access and misuse of
information.
7. Audit Logs:
 Description: Audit logs record and store information about system activities, user
actions, and security events. Regularly reviewing audit logs helps detect
suspicious or unauthorized activities, aiding in the identification and mitigation of
security incidents.
8. Honey Pots:
 Description: Honey pots are decoy systems or networks designed to attract and
detect unauthorized access or cyber-attacks. By diverting attackers to these
intentionally vulnerable systems, organizations can gather information about
potential threats without exposing critical infrastructure.
9. Intrusion Detection Systems (IDS):
 Description: IDS monitors network or system activities for signs of malicious
behavior or security policy violations. It detects and alerts administrators about
potential threats, enabling a swift response to prevent or mitigate security
incidents.
10. Data Encryption:
 Description: Data encryption involves converting data into a coded form to
protect it from unauthorized access during transmission or storage. Encryption
algorithms use keys to encode and decode information, ensuring that only
authorized parties can decipher the encrypted data.

Cyber Crimes
Cybercrime, or computer crime, refers to criminal activities that are carried out using computers,
networks, and the internet.
Examples of common cybercrimes include;
 Hacking
 Phishing
 Electronic
fraud
 Cyber
bullying
 Cyber
Espionage
 Cyber
extortion
Intellectual property (IP)
Intellectual property (IP) refers to creations of the mind—ideas, inventions, artistic works,
designs, symbols, names, and images.
Intellectual Property Rights (IPR) are legal rights granted to individuals or entities to
protect their intellectual creations or inventions.

Protection of intellectual properties.


1. Patents:
 Patent rights provide inventors with exclusive rights to their inventions,
preventing others from making, using, selling, or importing the patented
invention without permission. Patents are typically granted for a limited
period, often 20 years.
2. Copyrights:
 Copyright grants creators‘ exclusive rights to their original works of
authorship, including literary, artistic, musical, and dramatic works. Copyright
protection allows creators to control the reproduction, distribution, public
performance, and display of their works.
3. Trademarks:
 Trademark rights protect distinctive signs, symbols, names, and logos used to
identify and distinguish goods or services. Trademark owners have the
exclusive right to use these marks in commerce, preventing others from using
similar marks that may cause confusion.

ICT ETHICS
Ict ethics are moral guidelines that govern the use of computers.
Computer ethics involves the use of computers in a morally acceptable way.
Some of the most common computer ethics include;
o Contribute to society and human well being
o Always avoid harm of others
o Always be honest and trustworthy
o Always exercise fairness and don‘t be discriminative
o Honor intellectual property rights
o Respect other individual‘s privacy
o Honor confidentiality

Code of conduct
A code of conduct is a written guideline that determines whether a particular action is ethical
or unethical.
Sample code of conduct includes;
1. Computers shall not be used to harm other people
2. Users shall not interfere with another person‘s work
3. Computers shall not be used to steal
4. Computers shall not be used to bear false witness
5. Users shall not copy software illegally
6. Users shall not use another individual‘s computer without permission
7. A user shall consider the social impact of the programs they design
8. Users should use computers in a way that demonstrates consideration and respect to
other people.
DATA COMMUNICATION AND NETWORKING SUMMARY
NETWORKING HARDWARE
These are all computers, peripherals and communication devices that enable one or
more computers to exchange items like data, instructions and information with each
other.

These include:
1. Network bridge

A network bridge is a network device that connects a local area network to another local
area network that uses the same protocol.

Illustration of how a network bridge works

Page 1
Note LAN stands for Local Area Network and WAN stands for Wide Area Network
2. Router

It is also a networking device that forwards data packets between computer networks.

Page 2
Illustration of how a router works

Wireless network interface


card

Wired network interface card

Connecting a network cable to a wired interface card at


the back of a computer system unit

Page 3
Illustrations of how wired and wireless network interface cards are used
How a wired network interface card is used

How a wireless network interface card is used

Page 4
Illustration of how a network switch works

Page 5
6. A repeater

A repeater is an electronic device that


receives a signal, cleans it of
unnecessary noise, regenerates it, and
retransmits it at a higher power level so
that the signal can cover longer
distances without degradation.

7. Gateway

Gateway connects two or more networks that can be of different types and provides
protocol conversion so that end devices with different protocol architectures can
interconnect.

8. Firewalls

Page 6
A firewall is a piece of hardware or software put on the network to prevent some
communications forbidden by the network policy.

9. Modems

A modem is device used to acquire an Internet connection from the ISP (Internet Service
Provider) to end user.

10. Networking cables


They are used to connect and transfer data and information between computers,
routers and networking switches.

Page 7
TOOLS THAT FACILITATE IN NETWORKING
Networking tool kit
A networking tool kit is tailored for complete computer and network maintenance and
troubleshooting.

1. Crimping tool.
A crimping tool is a device used to affix a connector to the end of a networking cable.

Page 8
3.A wire stripper/wire cutter. A wire stripper or wire cutter is a small hand-held device
that is used to remove the insulation from the wire.

Guided Media (physical)


Physical transmission media / guided media uses a physical connection such as a
cable between a sending device and receiving device
Examples of physical transmission media include twisted-pair cable, coaxial cable,
and fiber-optic cable.
1. A twisted-pair cable consists of one or more twisted-pair wires bundled together.

Twisted-pair cables can be:


Shielded twisted-pair (STP) cable: it has a metal wrapper around each twisted-pair
wire, which further reduces noise.

Unshielded twisted-pair (UTP). It has no metal shielding around the twisted-pair wire,
hence greatly affected by noise.

Page 9
2. Coaxial cable
A coaxial cable consists of a single copper wire surrounded by three layers which
include an insulating material, a woven or braided metal and a plastic outer coating.

3. Fiber-optic cable
A fiber-optic cable is made of glass or plastic and transmits signals in the form of light.

Page 10
NETWORK ARCHITECTURES/MODELS
Network architecture refers to the design of computers, devices, and media in a
network.
1. Client/server network model

A client/server network is a network model in which one or more computers are


designated as a server(s) and other computers on the network as clients.

2. Peer-to-peer network model

In a peer-to-peer model computers are connected to share Information or resources


with each other without the use of a Server.

Network Topologies
A topology is the physical arrangement of the devices in a communications network.
Network topologies include:
1. Star Topology

Workstation In a star topology,


all devices are
Hub/Switch connected to a
central hub, server
or network switch.
Printer

Page 11
2. Bus topology
In a bus network, each computer or device is connected to a common central line
known as the bus or the backbone.

Server computer
Bus/Backbone

printer

3. Ring Topology

printer

4. Mesh Topology
In a mesh topology, every
device has a dedicated point-
to-point link to every other
device.

Page 12
5. Tree/hierarchical topology
A tree network has a central line connecting together a series of star networks.

Server computer
printer

printer
Bus/Backbone
Workstations

6. Hybrid network topology

Hybrid network topology is a combination of two or more topologies.


It is two different types of topologies which is a mixture of two or more topologies. For
example if in an office in one department ring topology is used and in another star
topology is used, connecting these topologies will result in Hybrid Topology (ring
topology and star topology).

Transmission Modes in Computer Networks


Transmission mode refers to the mechanism of transferring of data between two devices
connected over a network. It is also called Communication Mode. There are three
types of transmission modes. They are:
1. Simplex Mode
2. Half duplex Mode

Page 13
3. Full duplex Mode

Simplex mode
In this type of transmission mode, data can be sent only in one direction i.e.
communication is unidirectional. We cannot send a message back to the sender.
Unidirectional communication is done in Simplex Systems where we just need to send a
command/signal, and do not expect any response back.
Examples of simplex Mode are loudspeakers, television broadcasting, television and
remote, keyboard and monitor etc.

Half duplex mode


Half-duplex data transmission means that data can be transmitted in both directions
on a signal carrier, but not at the same time.
For example, on a local area network using a technology that has half-duplex
transmission, one workstation can send data on the line and then immediately receive
data on the line from the same direction in which data was just transmitted. Hence
half-duplex transmission implies a bidirectional line (one that can carry data in both
directions) but data can be sent in only one direction at a time.
Example of half duplex is a walkie- talkie in which message is sent one at a time but
messages are sent in both the directions.

FULL DUPLEX Mode


In full duplex system we can send data in both the directions as it is bidirectional at the
same time in other words, data can be sent in both directions simultaneously.

Page 14
Example of Full Duplex is a Telephone Network in which there is communication
between two persons by a telephone line, using which both can talk and listen at the
same time.

In full duplex system there can be two lines one for sending the data and the other for
receiving data.

END

Page 15
Candidate’s Name: Random No. Personal
………………………………………………………. No.

Signature ……………………………………………

(Do not write your school/Center Name or Number anywhere on this booklet.)

S850/1
Subsidiary Information
and Communication
Technology
Paper 1
Nov/Dec.2013
2 ⁄ hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
Paper 1
2 hours 30 Minutes

INSTRUCTIONS TO CANDIDATES:
Answer all questions in this paper

This paper is made up of twenty equally weighted questions

All answers should be written in blue or black ink in the spaces provided in the
question paper.

For Examiners ‘ Use Only


1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

©2013 Uganda National Examinations Board Turn Over

1
Answer all the questions in this paper.

1. The table below shows specifications of two computers X and Y.


Computer Computer X Computer Y
Specifications
Processor Intel (R)3.2 GHz Intel(R) 3308 MHz
RAM 1GB 2000MB
Hard disk 4600MB 50GB
Monitor size 19” 15”
(a) Which of the two computers would you recommend for a company to
buy? (01 mark)

………………………………………………………………………………

(b) State two reasons to defend your answer in(a) (02 marks)
(i)……………………………………………………………………………
………………………………………………………………………………
(ii)……………………………………………………………………………
………………………………………………………………………………

(c) Which is the least important of the computer specifications given in the
table? (01 mark)
………………………………………………………………………………
………………………………………………………………………………

(d) State one reason defending your answer in (c) (01 marks)
………………………………………………………………………………
………………………………………………………………………………

2. (a) Explain how computers can be professionally be used by


(i) Teachers (02 marks)

………………………………………………………………………………
………………………………………………………………………………

(ii) Doctors (02 marks)

………………………………………………………………………………
………………………………………………………………………………

2
(b) State one health risk associated with continued usage of computers.
(01 marks)
……………………………………………………………………………………

3. (a) Explain the following terms in spreadsheet.

(i) Values. (02 marks)

……………………………………………………………………………………
……………………………………………………………………………………

(ii) Labels. (02 marks)

……………………………………………………………………………………
……………………………………………………………………………………

(b) Name a symbol used when writing functions in a spreadsheet. (01 mark)

……………………………………………………………………………………

4. (a) A student had a file on her laptop and wanted to transfer it to a computer
in a laboratory. Give three devices that she can use to transfer the file.
(03 marks)

(a)…………………………………………………………………………………

(b)…………………………………………………………………………………

(c)…………………………………………………………………………………

(b) Explain the following methods of transferring a file from one location to
another

(i) Drag. (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………

(ii) Copy (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………

3
5. (a) Give three factors a company should consider before buying any storage
devices. (03 marks)

(i)…………………………………………………………………………………
……………………………………………………………………………………

(ii)…………………………………………………………………………………
…………………………………………………………………………………....

(iii)………………………………………………………………………………..
……………………………………………………………………………………

(b) Teo’s network access speed is six megabytes per second. How many
kilobytes does Teo’s network receive or send per second? (02 marks)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

6. (a) Give one use for each of the following computer devices.

(i) Power supply unit. (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

(ii) System case. (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

(iii) CMOS battery. (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

4
(b) Explain the following

(i) Analog device. (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

(ii) Digital device. (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

7. (a) State three types of computer software. (02 marks)

(i)…………………………………………………………………………………

(ii)…………………………………………………………………………………

(iii)………………………………………………………………………………..

(b) Differentiate between a software version and release. (02marks)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
…………………………………………………………………………………....

8. (a) State two internet based tool that support web based research.
(02 marks)

(i)…………………………………………………………………………………

(ii)…………………………………………………………………………………

(b) Identify three things one would require in order to get connected to the
internet. (03 marks)

(a)…………………………………………………………………………………

(b)…………………………………………………………………………………

(c)…………………………………………………………………………………

5
9. Outline five factors which determine data transmission speed over the
internet. (05 marks)

(i)…………………………………………………………………………………

(ii)…………………………………………………………………………………

(iii)………………………………………………………………………………..

(iv)………………………………………………………………………………..

(v)…………………………………………………………………………………

10. (a) Give five factors an organization should consider before choosing a
Local Area Network (LAN) model. (05 marks)

(a)…………………………………………………………………………………
……………………………………………………………………………………

(b)…………………………………………………………………………………
……………………………………………………………………………………

(c)…………………………………………………………………………………
……………………………………………………………………………………

(d)…………………………………………………………………………………
……………………………………………………………………………………

(e)…………………………………………………………………………………
……………………………………………………………………………………

11.(a) Write the initial procedure for booting a computer system. (03 marks)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

6
(b) Give any two measures taken to ensure that computers in a laboratory are
safe. (02 marks)

(i)…………………………………………………………………………………
……………………………………………………………………………………

(ii)…………………………………………………………………………………
……………………………………………………………………………………

12. (a) A computer file is made up of a file name and file extension.

(i) What is the purpose of a file extension. (02 marks)

……………………………………………………………………………………
……………………………………………………………………………………

(ii) Write the file extension for word processor document. (01 mark)

……………………………………………………………………………………

(b) Okello deleted his file accidentally in which he can recover his file?
(02 marks)

……………………………………………………………………………………
……………………………………………………………………………………

13. (a) An internet café plans to replace a Cathode Ray Tube(CRT) monitors
with Liquid Crystal Display(LCD) monitors. Why should the café replace CRTs
with LCDs? (05 marks)

(i)…………………………………………………………………………………
……………………………………………………………………………………

(ii)…………………………………………………………………………………
……………………………………………………………………………………

(iii)……………………………………………………………………………….
……………………………………………………………………………………

(iv)………………………………………………………………………………..
……………………………………………………………………………………

(v)…………………………………………………………………………………
……………………………………………………………………………………

7
14. Indicate True or False against each statement in the table below. (05 marks)

Statement True/False
(a) Windows XP is graphical user interface operating system
(b) Presentation software supports multimedia
(c) Word processors have formula bars.
(d) Backup is to combine the content of two or more files to produce
one output file.
(e) The Disk Operating system is menu driven

15. Company A uses custom-made applications while company B uses off-shelf


applications.
Write down any five advantages Company B has over Company A. (05 marks)

(i)…………………………………………………………………………………
……………………………………………………………………………………

(ii)…………………………………………………………………………………
……………………………………………………………………………………

(ii)…………………………………………………………………………………
……………………………………………………………………………………

(iii)………………………………………………………………………………
……………………………………………………………………………………

(iv)………………………………………………………………………………
……………………………………………………………………………………

(v)…………………………………………………………………………………
……………………………………………………………………………………

16. (a) Explain the term Software Piracy. (02 marks)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

8
(b) Write down any three application programs that can be obtained from open
source software. (03 marks)

(i)…………………………………………………………………………………

(ii)…………………………………………………………………………………

(iii)………………………………………………………………………………..

17. The table below shows part of a database. Use it to answer the questions that
follow.

EMPLOYEE NAME TEL .NO SALARY NO. OF TOTAL


NO. MONTHS PAY

E227008 Betty 0774267820 $700,000 3

E227011 Kintu 0701998142 $400,000 4

(a) Write down the data types in the following fields


(i) TEL No (01 mark)
……………………………………………………………………………………

(ii) SALARY (01 mark)

……………………………………………………………………………………

(b) Suggest a suitable primary key. (01 mark)

……………………………………………………………………………………

(c) The formula entered in the design view to determine TOTAL PAY,
which is a product of SALARY and NO. OF MONTHS is. (02 marks)

……………………………………………………………………………………
……………………………………………………………………………………

9
18. State any five characteristics of modern computer. (05 marks)

(i)…………………………………………………………………………………
……………………………………………………………………………………

(ii)…………………………………………………………………………………
……………………………………………………………………………………

(iii)………………………………………………………………………………..
……………………………………………………………………………………

(iv)……………………………………………………………………………….
……………………………………………………………………………………

(v)…………………………………………………………………………………
……………………………………………………………………………………

19. From the given terminologies used for internet and network below, choose
the correct one to complete each of the statements that follow.

 A discussion group
 Instant messaging
 Video conferencing
 A chat room
 Online shopping
 Telephony
(a) The type of internet communication that allows multiple users to
exchange messages in real time is
called……………………………………………………… ….(01 mark)

(b) The type of internet communication that enables individuals to post


messages on a particular topic for others to read and respond to is called
(02 marks)
……………………………………………………………………………..

(c) The use of multimedia technologies in communication is called


(02 marks)

………………………………………………………………………………

10
20.(a) Explain the following terms as used in electronic mail.

(i) Blind Carbon Copy (BBC). (02 marks)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

(ii) Carbon Copy (CC). (02 marks)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

(b) State one requirement needed for one to send an email. (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………

END

11
Candidate’s Name: Random No. Personal
………………………………………………………. No.

Signature ……………………………………………

(Do not write your school/Center Name or Number anywhere on this booklet.)

S850/1
Subsidiary Information
and Communication
Technology
Paper 1
Nov/Dec.2014
2 ⁄ hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
Paper 1
2 hours 30 Minutes

INSTRUCTIONS TO CANDIDATES:
Answer all questions in this paper

This paper is made up of twenty equally weighted questions

All answers should be written in blue or black ink in the spaces provided in the
question paper.

For Examiners ‘ Use Only


1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

©2014 Uganda National Examinations Board Turn Over

1
Answer all the questions in this paper

1. (a) Explain the term Information and Communication Technology. (02 marks)

………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………

b) State three ways in which information technology has improved


communication. (03 marks)

(i)……………………………………………………………………………………
………………………………………………………………………………………

(ii)……………………………………………………………………………………
………………………………………………………………………………………

(iii)…………………………………………………………………………………
………………………………………………………………………………………

2. Give one reason why a school director would purchase the following equipment
for a computer laboratory.

(a) Blower. (01 mark)

………………………………………………………………………………………
………………………………………………………………………………………
……………………………………………………………………………………...

(b) Anti-glare filter screens. (02 marks)

………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………

(c) Air conditioner. (02 marks)

………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
2
3. During a practical examination students were required to open a blank file and
save its as
D:\STUDENT WORK\EOT PRACTICAL\safety.doc.

(a) State the name of the immediate subfolder in which students must save the file.
(01 mark)
………………………………………………………………………………………

b) Write the root directory onto which the file must be saved. (02 marks)

……………………………………………………………………………………….

c) Suggest one example of a computer application the student can use to create the
file. (01 mark)
………………………………………………………………………………………

d) State the name of the file represented by the above file path. (01 mark)

………………………………………………………………………………………

4. Study the devices and answer questions that follow.

A B C

D E

(a) Name the devices labeled. (03 marks)

A……………………………………………………………………………………

B……………………………………………………………………………………

C……………………………………………………………………………………

3
(b) Give one major similarity between devices A and E. (01 mark)

………………………………………………………………………………………
………………………………………………………………………………………

(c) Identify one device which can be categorized as an output device. (01 mark)

………………………………………………………………………………………

5. Read the statement below and write the words TRUE or FALSE in the spaces
provided. (05 marks)

STATEMENT TRUE/FALSE
(a) Machine code is one of the level computer languages.
(b) Microsoft is the only operating system in use in Uganda
(c) WINZIP is an example of system software which reduces the
actual size of a file
(d) A student delivering a presentation would need an LCD
projector and laptop.
(e) Screen savers can be categorized as desktop publishing
software since they can be used for advertising purposes.

6. (a) State any two adverse effects of using internet for the business and
communication. (02 marks)

(i)……………………………………………………………………………………
………………………………………………………………………………………

(ii)……………………………………………………………………………………
……………………………………………………………………………………….

b) Suggest the most appropriate Internet Communication services in the following


situations.

(i) Outline meetings between two company employees in geographically separated


regions. (01 mark)

………………………………………………………………………………………

4
(ii) Instant and real time communication between friends. (01 mark)

………………………………………………………………………………………

(iii) Typed views on an on-going online discussion amongst a specific group of


people. (01 mark)

………………………………………………………………………………………

7. Identify any three devices other than computers require to set up a network
within a school environment. (03 marks)

(a)……………………………………………………………………………………

(b)……………………………………………………………………………………

(c)……………………………………………………………………………………

b) Distinguish between data communication and networking. (02 marks)

………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………

8. (a) List any three possible threats to data in a computer networked environment.
(03 marks)

(i)……………………………………………………………………………………
(ii)…………………………………………………………………………………..
(iii)………………………………………………………………………………….

b) Name any two types of security measures which can be used to control the
threats listed in (a) above. (02 marks)

(i)……………………………………………………………………………………
………………………………………………………………………………………

(ii)……………………………………………………………………………………
………………………………………………………………………………………

5
9. Given below is the notice which the head girl has typed and intends to pin on all
the notice boards in the school.
THE REGIONAL SWIMMING GALA
ON 22ND NOVEMBER 2014
AT MAKERERE UNIVERSITY POOL
FEE: 500
REGISTER WITH HEADGIRL

Explain any five word processing features which the head girl would use to
enhance the appearance of the above notice.
(05 marks)

(a)……………………………………………………………………………………
………………………………………………………………………………………

(b)……………………………………………………………………………………
………………………………………………………………………………………

(c)……………………………………………………………………………………
………………………………………………………………………………………

(d)……………………………………………………………………………………
………………………………………………………………………………………

(e)……………………………………………………………………………………
………………………………………………………………………………………

10. (a) Suggest one way in which computers have been made user friendly for
persons that are physically challenged in the following areas.

(i) Without hands. (01 mark)

………………………………………………………………………………………
………………………………………………………………………………………

(ii) Impaired vision. (01 mark)


………………………………………………………………………………………
………………………………………………………………………………………

6
b) Give three health issues that may be caused by the prolonged use of computers.
(03 marks)

(i)……………………………………………………………………………………
………………………………………………………………………………………

(ii)……………………………………………………………………………………
………………………………………………………………………………………

(iii)…………………………………………………………………………………
………………………………………………………………………………………

11. Choose the appropriate file extensions from the list given for sentences (a) to
(e)
.doc , txt , tif , bat , sys

(a) Program file that perform fundamental operation in a computer. (01 mark)

………………………………………………………………………………………

(b) A Microsoft word file. (01 mark)

………………………………………………………………………………………

(c) A file containing series of commands during boot up. (01 mark)

………………………………………………………………………………………

(d) A plain file created using note pad. (01 mark)

………………………………………………………………………………………

(e) A graphic file created using application such as Adobe Photoshop. (01 mark)

………………………………………………………………………………………

7
12. (a) State any three operations of the machine cycle of a Central Processing
Unit. (03 marks)

(i)…………………………………………………………………………………….
……………………………………………………………………………………….

(ii)……………………………………………………………………………………
……………………………………………………………………………………….

(iii)…………………………………………………………………………………..
………………………………………………………………………………………

(b) Describe any one of the operations stated in (a) above. (02 marks)

………………………………………………………………………………………
………………………………………………………………………………………

13. (a) A set of instructions that are arranged in a logical way to run a computer is
called. (01 marks)

………………………………………………………………………………………

(b) List any three categories of system software. (03 marks)

(a)……………………………………………………………………………………

(b)……………………………………………………………………………………

(c)……………………………………………………………………………………

(c) Give one example of presentation software. (01 mark)

………………………………………………………………………………………

14. (a) Give three benefits of connecting computer to the internet. (03 marks)

(i)……………………………………………………………………………………
………………………………………………………………………………………
(ii)……………………………………………………………………………………
………………………………………………………………………………………
(iii)…………………………………………………………………………………..
………………………………………………………………………………………
8
(b) Outline two disadvantages of connecting computers to the internet. (02 marks)

………………………………………………………………………………………
………………………………………………………………………………………

15. Explain why an organization would prefer to use Electronic Mail (E-mail) over
ordinary mail. (05 marks)

(i)……………………………………………………………………………………
………………………………………………………………………………………

(ii)……………………………………………………………………………………
………………………………………………………………………………………

(iii)…………………………………………………………………………………..
………………………………………………………………………………………

(iv)………………………………………………………………………………….
………………………………………………………………………………………

(v)……………………………………………………………………………………
……………………………………………………………………………………….

16. Outline five areas of self-employment that a sub ICT can engage in. (05 marks)

(i)……………………………………………………………………………………

(ii)……………………………………………………………………………………

(iii)…………………………………………………………………………………..

(iv)…………………………………………………………………………………..

(v)……………………………………………………………………………………

17. Use the terms below to complete the sentences that follow in (a)-(e) (05 marks)

 Slide animation  Slide design


 Slides  Slide show
 Animation effect  Slide master
 Slide layout  Handouts

9
(a) The visual presentation from one slide to another
slide…………………………………………………………………………

(b) The ……………………………………………………………….set up the


way text/ objects appear on a slide during a presentation.

(c) The presentation of slide in a sequence on a projection screen is referred to a


………………………………………………………………………………

(d) The ………………………………………………………..defines the


arrangement of all items that make up a slide.
(e) A user can print the entire presentation on one page by printing
the……………………………………………………………………………

18. (a) State one difference between a Compact Disc(CD) and Digital Versatile
Disc(DVD). (01 marks)

………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………

(b) Explain the circumstances under which the following storage devices are used

(i) Memory card. (02 marks)

………………………………………………………………………………………
………………………………………………………………………………………

(ii) Flash disk. (02 marks)

………………………………………………………………………………………
………………………………………………………………………………………

10
19. (a) Describe the following terms in programming languages.

(i) Interpreters. (01 mark)

………………………………………………………………………………………
………………………………………………………………………………………

(ii) Syntax. (01 mark)

………………………………………………………………………………………
………………………………………………………………………………………

(iii) Debugging. (01 mark)

………………………………………………………………………………………
………………………………………………………………………………………

(b) Identify two characteristics of a good programming language. (02 marks)

………………………………………………………………………………………
………………………………………………………………………………………

20. Using the email address:[email protected], identify what these parts stand for.

(a)annet. (01 mark)

………………………………………………………………………………………

(b) @ . (01 mark)


………………………………………………………………………………………

(c)gmail (01 mark)

………………………………………………………………………………………

(d) .com (02 marks)

………………………………………………………………………………………
………………………………………………………………………………………
END

11
Candidate’s Name: Random No. Personal
………………………………………………………. No.

Signature ……………………………………………

(Do not write your school/Center Name or Number anywhere on this booklet.)

S850/1
Subsidiary Information
and Communication
Technology
Paper 1
Nov/Dec.2015
2 ⁄ hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
Paper 1
2 hours 30 Minutes

INSTRUCTIONS TO CANDIDATES:
Answer all questions in this paper

This paper is made up of twenty equally weighted questions

All answers should be written in blue or black ink in the spaces provided in the
question paper.

For Examiners ‘ Use Only


1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

©2015 Uganda National Examinations Board Turn Over

1
Answer all the questions in this paper

1. (a) Distinguish between Random Access Memory(RAM and Secondary


storage. (04 marks)
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

(b) Give an example of secondary storage (01 mark)


……………………………………………………………………………………

2. Explain each one of the following database features


a) Field Name (02 marks)

……………………………………………………………………………………
……………………………………………………………………………………

b) Field properties (01 marks)

……………………………………………………………………………………
……………………………………………………………………………………

c) Data type (02 marks)

……………………………………………………………………………………
……………………………………………………………………………………

3. (a) Differentiate between Computer servicing and computer repair


(02 marks)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

2
b) Write one reason for having the following items in the computer laboratory

i) Woolen carpet (01 mark)


……………………………………………………………………………………
……………………………………………………………………………………

ii) Blower (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………

iii) CCTV cameras. (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………

4. (a) Don is a new computer user. As an ICT student advise Don on which
tool to use.
i) To trace files he cannot locate. (01 mark)
……………………………………………………………………………………
……………………………………………………………………………………

ii) To trace a word from an open document. (01 mark)


……………………………………………………………………………………
……………………………………………………………………………………

b) A student is typing a document using Microsoft word. Write down three


steps the student will use to shut down the computer. (03 marks)

(i)…………………………………………………………………………………
……………………………………………………………………………………

(ii)…………………………………………………………………………………
……………………………………………………………………………………

(iii)……………………………………………………………………………….
……………………………………………………………………………………

3
5. State five activities that can be performed on a computer when using a
mouse. (05 marks)

(a)…………………………………………………………………………………
……………………………………………………………………………………

(b)…………………………………………………………………………………
……………………………………………………………………………………

(c)…………………………………………………………………………………
……………………………………………………………………………………

(d)…………………………………………………………………………………
……………………………………………………………………………………

(e)…………………………………………………………………………………
……………………………………………………………………………………

6. Identify five ICT related employment opportunities in Uganda today


(05 marks)

(a)…………………………………………………………………………………
……………………………………………………………………………………

(b)…………………………………………………………………………………
……………………………………………………………………………………

(c)…………………………………………………………………………………
……………………………………………………………………………………

(d)…………………………………………………………………………………
……………………………………………………………………………………

(e)…………………………………………………………………………………
……………………………………………………………………………………

7. (a) What is multiprocessing? (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

4
b) Give two advantages of each of the following Operating systems

i) Windows. (02 marks)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

ii) Linux (02 marks)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

8. (a) Name two examples of an application software. (02 marks)

(i)…………………………………………………………………………………

(ii)…………………………………………………………………………………

b) State three problems associated with usage of packaged software


(03 marks)

(a)…………………………………………………………………………………
……………………………………………………………………………………

(b)…………………………………………………………………………………
……………………………………………………………………………………

(c)…………………………………………………………………………………
……………………………………………………………………………………

9. (a) What is the World Wide Web? (02 marks)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

5
b) Show three ways in which the internet can facilitate trade and business.
(03 marks)

(a)…………………………………………………………………………………
……………………………………………………………………………………

(b)…………………………………………………………………………………
……………………………………………………………………………………

(c)…………………………………………………………………………………
……………………………………………………………………………………

10. Show one way in which the Internet can be a danger to


a) Morality. (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………

b) Labour. (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………

c) System security. (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………

d) Human Security. (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………

e) Information. (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………

11. Explain the following attribute of computers which make them dependable
and reliable tools
a) Diligence. (02 marks)
……………………………………………………………………………………
……………………………………………………………………………………

6
b) Versatility. (02 marks)

……………………………………………………………………………………
……………………………………………………………………………………

c) Accuracy. (01 marks)

……………………………………………………………………………………
……………………………………………………………………………………

12.(a) Describe the term computer Literacy. (02 marks)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

b) Outline any three ways in which ICT can improve the quality of Education.
(03 marks)

(a)…………………………………………………………………………………
……………………………………………………………………………………

(b)…………………………………………………………………………………
……………………………………………………………………………………

(c)…………………………………………………………………………………
……………………………………………………………………………………

13. (a) State the difference between copy a file and move a file. (02 marks)

……………………………………………………………………………………
…………………….……………………………………………………………..
……………………………………………………………………………………
……………………………………………………………………………………

b). Study the file path below and answer the questions that follow
F\accounts\bursar\fees.xls

i) Identify the file name (01 marks)

……………………………………………………………………………………

7
ii) On what drive is the file located? (01 mark)

……………………………………………………………………………………

iii) In which subfolder is the file located? (01 mark)

……………………………………………………………………………………

14. (a) List any three input devices. (03 marks)

(a)…………………………………………………………………………………

(b)…………………………………………………………………………………

(c)…………………………………………………………………………………

b) Give a function of any two input devices listed in (a) above (02 marks)

(a)…………………………………………………………………………………
……………………………………………………………………………………

(b)…………………………………………………………………………………
……………………………………………………………………………………

15. Identify the following from the email address [email protected]


a) (i) Domain name (01 mark)

……………………………………………………………………………………
(ii) User name. (01 mark)

……………………………………………………………………………………

iii). Top level domain name (01 mark)

……………………………………………………………………………………

b) (i) In which type of organization does the domain name of the email, user
above, subscribe to. (01 mark)

……………………………………………………………………………………

ii) Give any other example other than the one type you have stated in b(i) above.
(01 mark)

……………………………………………………………………………………

8
16. (a) Define the term Computer Network. (02 marks)

……………………………………………………………………………………
……………………..……………………………………………………………..
……………………………………………………………………………………
……………………………………………………………………………………

b) Give three disadvantages of networking computers. (03 marks)

(i)…………………………………………………………………………………
……………………………………………………………………………………

(ii)…………………………………………………………………………………
……………………………………………………………………………………

(iii)……………………………………………………………………………….
……………………………………………………………………………………

17. (a) Differentiate between a server and a client computer. (02 marks)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

b) What is the function of each of the following network devices?

i) Bridge (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………

ii) Switch (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………

iii) Router (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………

9
18. The table below shows a worksheet which Nabirye was working on .Use it
to answer the questions that follow.

A B C D E
1 ID Number Name Item 1 Item 2 29.1
2 100000 Akello 990 34 11.8
3 100000 Nambi 660 58 #DIV/O!
4 ####### Busingye 8800 -
5 #NAME?
6

a) (i) Suggest a reason why the entry in cell A4 appeared as shown. (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………

(ii) How do you rectify the error in cell A4? (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………

(iii) What does the error in cell E4 mean? (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………

(iv) How do you correct the error in cell D5? (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………

19.(a) Tick the three utility programs from the list below. (03 marks)

Tick(√)
Web browser
Data compressor
Disk defragmenter
Operating system
Antivirus software

10
b) State the function of any two utility programs you ticked in (a) above.
(02 marks)

i)…………………………………………………………………………………
…………………………………………………………………………………..
ii)…………………………………………………………………………………
……………………………………………………………………………………

20. (a) Explain the following terms giving an example in each case

(i) Simplex. (02 marks)

……………………………………………………………………………………
……………………………………………………………………………………
…………………………………………………………………………………...
Example

……………………………………………………………………………………

ii) Half Duplex. (02 marks)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

Example

……………………………………………………………………………………

b) Identify one non-physical data transmission media. (01 mark)

Tick here
Optic fiber
Bluetooth
Twisted pair

END

11
Candidate’s Name:
………………………………………………… Random No. Personal
Signature No.
…………………………………………………
(Do not write your school/Center Name or Number anywhere on this booklet.)

S850/1
Subsidiary Information
and Communication
Technology
Paper 1
Nov/Dec.2016
2 ⁄ hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
Paper 1
2 hours 30 minutes

INSTRUCTIONS TO CANDIDATES:

Answer all questions in this paper

This paper is made up of twenty equally weighted questions

All answers should be written in blue or black ink in the spaces provided in the
question paper

For Examiners ‘ Use Only


1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

©2016 Uganda National Examinations Board Turn Over

1
Answer all questions in this paper

1. In modern world, every person is endeavoring to ease access to


information. Give five reasons why students in Secondary Schools should
not be allowed to have mobile phones. (05 marks)

(a)……………………………………………………………………………
………………………………………………………………………………

(b)……………………………………………………………………………
………………………………………………………………………………

(c)……………………………………………………………………………
………………………………………………………………………………

(d)……………………………………………………………………………
………………………………………………………………………………

(e)……………………………………………………………………………
………………………………………………………………………………

2. (a) Explain the Importance of servicing and maintenance of computers.


(02 marks)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

(b) Suggest any three activities involved in servicing and maintenance of


computers. (03 marks)

(i)…………………………………………………………………………………
……………………………………………………………………………………

(ii)…………………………………………………………………………………
……………………………………………………………………………………

(iii)………………………………………………………………………………
……………………………………………………………………………………

2
3. Use the image below to answer the question that follows.

(a) Write down the path for the subfolder called My Videos. (03 marks)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

(b) Describe a method you can use to recover an accidentally deleted folder
from the desktop. (02 marks)

……………………………………………………………………………………
……………………………………………………………………………………

4. Describe the following terms as used in Information and Communication


Technology. (ICT) (05 marks)

(a) System Unit

……………………………………………………………………………………
……………………………………………………………………………………

(b) RAM chip

……………………………………………………………………………………
……………………………………………………………………………………

(c) Power Supply

……………………………………………………………………………………
……………………………………………………………………………………

3
(d) Bus

……………………………………………………………………………………
……………………………………………………………………………………

(e) Peripheral devices

……………………………………………………………………………………
……………………………………………………………………………………

5. (a) Define the term File extension. (02 marks)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

(b) Fill in the right file extension for the following file. (03 marks)

(i) Audio File…………………………………………………………………….

(ii) Word Document………………………………………………………………

(iii) Presentation document………………………………………………………

6. (a)What is an output device? (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

(b) Give the two categories of printers and an example in each case.

(i) Category………………………………………………………………………

Example……………………………………………………………………...
(02 marks)

(ii) Category………………………………………………………………………

Example………………………………………………………………………
(02 marks)

4
7. (a) Distinguish between system and application software. (02 marks)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

(b) Give three types of language translators used in programming. (03 marks)

(i)…………………………………………………………………………………

(ii)…………………………………………………………………………………

(ii)…………………………………………………………………………………

8. (a) Differentiate between a computer hardware and computer software.


(02 marks)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

(b) Storage device is one of the categories of computer hardware. List the other
three categories. (03 marks)

(i)…………………………………………………………………………………
(ii)…………………………………………………………………………………
(iii)………………………………………………………………………………..

9. Indicate TRUE or FALSE against each statement in the table below.


(05 marks)

STATEMENTS TRUE/FALSE
(a) Public domain software is copyrighted
(b) Off-the-shelf software is developed and sold for profit
(c) Source codes of open source software programs are only available
to paid up subscribers.
(d) Shareware programs are widely available from a variety of
download sites on the internet
(e) Freeware programs are frequently developed by only amateur
programmers.

5
10. (a) Define the term Motherboard. (02 marks)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

(b) Identify any three components housed on the motherboard. (03 marks)

(i)…………………………………………………………………………………

(ii)…………………………………………………………………………………

(iii)………………………………………………………………………………

11. (a) Define the following terms as used in publications.

(i) Frame. (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

(ii) Template (01 mark)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
…………………………………………………………………………………..

(b) List any two desktop publication soft wares (02 marks)

(i)…………………………………………………………………………………

(ii)…………………………………………………………………………………

(c) Name a document that can be produced using publication software.


(01 mark)

……………………………………………………………………………………

6
12. Complete the table below. (05 marks)

APPLICATION SOFTWARE PURPOSE


(a) Word processing
…………………………………………...
………………………………………….

(b) Used to organize data in rows and


…………………………………….. columns and also perform calculations.

(c) Database Management systems


…………………………………………
…………………………………………

(d) Desktop publishing software


…………………………………………
…………………………………………

Used to combine text, graphics,


(e) ……………………………………… animation, audio, and video.

13. Computer data and software are exposed to a number of risks hence need for
great care and protection. Suggest five ways of protecting data and software.
(05 marks)

(a)…………………………………………………………………………………
……………………………………………………………………………………

(b)…………………………………………………………………………………
……………………………………………………………………………………

(c)…………………………………………………………………………………
……………………………………………………………………………………

(d)…………………………………………………………………………………
……………………………………………………………………………………

(e)…………………………………………………………………………………
……………………………………………………………………………………

7
14. (a) Give three benefits for sending documents using email service.
(03 marks)

(i)…………………………………………………………………………………
……………………………………………………………………………………

(ii)…………………………………………………………………………………
……………………………………………………………………………………

(iii)………………………………………………………………………………
……………………………………………………………………………………

(b) State two benefits for sending documents using ordinary post. (02 marks)

(i)…………………………………………………………………………………
……………………………………………………………………………………

(ii)…………………………………………………………………………………
……………………………………………………………………………………

15. Use the terms below to complete the statements that follow. (05 marks)

Virtual Reality WIFI


Simulation
Bluetooth Artificial Intelligence

(a) The Science of representing behavior of real life situation using a


computerized model is
……………………………………………………………………………
(b) The Technology that allows an electronic device to exchange data using
Radio waves over a computer network
is……………………………………………………………………………
(c) The technology that allows users to transfer data for a short distance
between mobile devices
is………………………………………………………………………...
(d) The technique that rates images by a computer that appear to surround the
person looking at them
is……………………………………………………………………….

(e) The Science of computers that enable qualities of human beings to be


imitated is……………………………………………………………….

8
16. (a) Distinguish between hyperlink and homepage. (02 marks)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

(b) Identify three netiquette guidelines while using the internet. (03 marks)

(i)…………………………………………………………………………………
……………………………………………………………………………………

(ii)…………………………………………………………………………………
……………………………………………………………………………………

(iii)………………………………………………………………………………
……………………………………………………………………………………

17. (a) Give two wireless transmission media. (02 marks)

(i)…………………………………………………………………………………

(ii)…………………………………………………………………………………

(b) Identify three limitations of wireless transmission media. (03 marks)

(i)…………………………………………………………………………………
……………………………………………………………………………………

(ii)…………………………………………………………………………………
……………………………………………………………………………………

(ii)…………………………………………………………………………………
……………………………………………………………………………………

18. Choose the correct terms to complete the statements (a)-(e)

Rename Watermark
Bookmark Mail Merge
Merge Pointer
Cursor Indent
(05 marks)

9
(a) A background feature in a document is referred to as

………………………………………………………………………………

(b) The feature that allows duplication of a document with unique addresses
is

……………………………………………………………………………

(c) The feature that starts a line of text further from the margin is

………………………………………………………………………………..

(d) The feature that assigns a name to a specific point in a document is


called.

………………………………………………………………………………

(e) A symbol on the screen that indicated an insertion point in a document is


a

………………………………………………………………………………..

19. Explain each of the following terms as used in Information and


Communication Technology. (05 marks)

(a) Communication

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

(b) Network

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

(c) Protocol

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

10
(d) Modem

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

(e) Bandwidth

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

20. Outline five uses of intranets in an organization (05 marks)

(a)…………………………………………………………………………………
……………………………………………………………………………………

(b)…………………………………………………………………………………
……………………………………………………………………………………

(c)…………………………………………………………………………………
……………………………………………………………………………………

(d)…………………………………………………………………………………
……………………………………………………………………………………

(e)…………………………………………………………………………………
……………………………………………………………………………………

END
11
Candidate’s Name:……………………………………………………………...
Random No. Personal No.
Signature: …………………………………………

(Do not write your school/Center Name or Number anywhere on this booklet.)

S850/1
Subsidiary Information
and Communication
Technology
Paper 1
Nov./Dec.2017
2 ⁄ hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
Paper 1
2 hours 30 minutes

INSTRUCTIONS TO CANDIDATES:

Answer all questions in this paper

This paper is made up of twenty equally weighted questions

All answers should be written in blue or black ink in the spaces provided in the
question paper

For Examiners ‘ Use Only


1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

©2017 Uganda National Examinations Board Turn Over


Answer all questions in this paper.

1. (a) Name one tool used to remove dust from a computer. (01 mark)
……………………………………………………………………………
(b) Give reasons why one would require the following in the computer
laboratory;
(i) Uninterruptible Power Supply. (02 marks)

……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………

(ii) LCD Projector. (02 marks)

……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………

2. (a) Write down the procedure for changing the name of an existing file or
folder. (03 marks)
(i)…………………………………………………………………………
……………………………………………………………………………
(ii)…………………………………………………………………………
……………………………………………………………………………
(iii)…………………………………………………………………………
…………………………………………………………………………….
(b) Explain the function of a device driver in a computer system.
(02 marks)
……………………………………………………………………………
……………………………………………………………………………
…………………………………………………………………………….

1
3. Write the following in full as used in Information and Communication
Technology; (05 marks)
(a) CCTV……………………………………………………………
(b) ROM…………………………………………………………….
(c) CAD……………………………………………………………..
(d) CPU……………………………………………………………...
(e) VDU……………………………………………………………..
4. (a) Identify one storage device that is resistant to virus attacks. (01 mark)
……………………………………………………………………………..
(b) Describe the following terms as used in computers;
(i) File. (02 marks)

……………………………………………………………………………
……………………………………………………………………………

(ii) Folder. (02 marks)

……………………………………………………………………………
……………………………………………………………………………

5. (a) State four categories of the components of a computer system.


(04 marks)
(i)…………………………………………………………………………..
(ii)………………………………………………………………………….
(iii)…………………………………………………………………………
(iv)…………………………………………………………………………
(b) Give the function of any one category you have stated in 5(a).
(01 mark)
……………………………………………………………………………
……………………………………………………………………………

2
6. Indicate TRUE or FALSE against each statement in the table below:
(05 marks)
STATEMENT TRUE/FALSE
(a) Open source software is copyrighted and distributed
without cost for trial period.
(b) Product activation is used to ensure that software is not
installed illegally.
(c) Programming software interfaces user application and
computer hardware.
(d) A file extension is a combination of characters used to
identify a file.
(e) A clipboard holds copied data

7. (a) Define the term hardware as used in Information and Communication


Technology. (02 marks)
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
(b) Name two ports used to connect devices on a computer. (02 marks)
(i)…………………………………………………………………………..
(ii)………………………………………………………………………….
(c) Give one device that can be used to transfer a hard copy document to
a computer. (01 mark)
……………………………………………………………………………..
8. (a) What is system software? (01 mark)
……………………………………………………………………………
……………………………………………………………………………
…………………………………………………………………………….

3
Turn Over
(b) Outline any four functions of an operating system. (04 marks)
(i)…………………………………………………………………………
……………………………………………………………………………
(ii)…………………………………………………………………………
…………………………………………………………………………….
(iii)…………………………………………………………………………
……………………………………………………………………………..
(iv)…………………………………………………………………………
……………………………………………………………………………..
9. (a) Distinguish between Reading and Writing in relation to storage
medium. (02 marks)
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
(b) Mention one example for each of the types of storage devices given
below: (03 marks)
(i) Optical storage…………………………………………….....
(ii) Magnetic storage……………………………………………..
(iii) Solid state…………………………………………………….
10.(a) Name any two examples of documents created using desktop
publishing application. (02 marks)
(i)…………………………………………………………………………..
(ii)………………………………………………………………………….
(b) State any three desktop publishing features that enhance the
documents you have named in 10(a). (03 marks)
(i)…………………………………………………………………………..
(ii)………………………………………………………………………….
(iii)…………………………………………………………………………

4
11.(a) Outline any three threats a System Administrator may face as a result
of networking computers. (03 marks)
(i)………………………………………………………………………......
......................................................................................................................
(ii)…………………………………………………………………………
…………………………………………………………………………….
(iii)…………………………………………………………………………
……………………………………………………………………………..
(b) Suggest any two measures that the system administrator can employ
to reduce the network threats. (02 marks)
(i)…………………………………………………………………………
……………………………………………………………………………
(ii)…………………………………………………………………………
……………………………………………………………………………
12.Study the data communication diagram below and answer the questions
that follow:
B

A C
(a) Name the elements of data communication labelled; (03 marks)
A. ………………………………………………………………………
B. ………………………………………………………………………
C. ………………………………………………………………………
(b) Suggest the devices used to connect A to B. (01 mark)

………………………………………………………………………………...

(c) State the protocol used to uniquely identify A and C. (01 mark)

………………………………………………………………………………...

5
Turn Over
13.The table below consists of some of the peripheral devices of a computer.
Indicate Input or Output. (05 marks)

PERIPHERAL DEVICE INPUT/OUTPUT


(a) Biometric Reader
(b) Projector
(c) Plotter
(d) Scanner
(e) Headphones

14.(a) Give two reasons why an electronic spreadsheet application is suitable


for preparing budgets. (02 marks)
(i)…………………………………………………………………………
……………………………………………………………………………
(ii)…………………………………………………………………………
…………………………………………………………………………….
(b) State one use of each of the following applications;
(i) Presentation software. (01 mark)

……………………………………………………………………………
…………………………………………………………………………….

(ii) Word processor. (01 mark)

……………………………………………………………………………
……………………………………………………………………………

(iii) Communication software. (01 mark)

……………………………………………………………………………
…………………………………………………………………………….

6
15.(a) Name one example of a presentation software. (01 mark)
……………………………………………………………………………..
(b) Give the importance of each of the following features as used in
electronic presentation;
(i) Master slide. (02 marks)
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
(ii) Transitions. (02 marks)

……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………

16.(a) State three advantages of using e-mail services over sending mail by
post. (03 marks)
(i)…………………………………………………………………………
……………………………………………………………………………
(ii)…………………………………………………………………………
…………………………………………………………………………….
(iii)…………………………………………………………………………
……………………………………………………………………………
(b) State two advantages of post-mail services over e-mail
communication. (02 marks)
(i)…………………………………………………………………………
……………………………………………………………………………
(ii)…………………………………………………………………………
……………………………………………………………………………

7
Turn Over
17.Give five examples of networking hardware. (05 marks)
(a)…………………………………………………………………………..
(b)…………………………………………………………………………..
(c)………………………………………………………………………….
(d)………………………………………………………………………….
(e)………………………………………………………………………….
18.Outline five ways in which a student can use the internet. (05 marks)
(a)…………………………………………………………………………
…………………………………………………………………………….
(b)…………………………………………………………………………
…………………………………………………………………………….
(c)…………………………………………………………………………
……………………………………………………………………………..
(d)…………………………………………………………………………
…………………………………………………………………………….
(e)…………………………………………………………………………
…………………………………………………………………………….
19.(a) (i) What is data transmission media? (01 mark)
……………………………………………………………………………
……………………………………………………………………………
(ii) Give two examples of transmission media. (02 marks)
(i)…………………………………………………………………………
(ii)…………………………………………………………………………
(b) Name two services offered by data communication tools. (02 marks)
(i)………………………………………………………………………….
(ii)…………………………………………………………………………

8
Turn Over
20. (a) Give any two services that use Electronic payment (E-payment) method.
(02 marks)

(i) …………………………………………………………………...
(ii) …………………………………………………………………..

(b) State three advantages of using E-payments over traditional methods.


(03 marks)

(i)…………………………………………………………………………………
……………………………………………………………………………………

(ii)…………………………………………………………………………………
……………………………………………………………………………………

(iii)………………………………………………………………………………
……………………………………………………………………………………

9
END
Candidate’s name……………………………………………………………...
Random No. Personal No.
Signature ……………………………………….

(Do not write your school/Center Name or Number anywhere on this booklet)

S850/1
Subsidiary Information
and Communication
Technology
Paper 1
Nov./Dec.2018
2 ⁄ hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
Paper 1
2 hours 30 minutes

INSTRUCTIONS TO CANDIDATES:

Answer all questions in this paper

This paper is made up of twenty equally weighted questions

All answers should be written in blue or black ink in the spaces provided in the
question paper

For Examiners ‘ Use Only


1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

1
©2018 Uganda National Examinations Board Turn Over
Answer all questions in this paper.

1. (a) List three major specifications one would consider when buying a laptop
computer. (03 marks)
(i) ……………………………………………………………………………..
(ii) ……………………………………………………………………………..
(iii) …………………………………………………………………………….
(b) Illustrate the information processing cycle. (02 marks)

2. (a) Distinguish between cold booting and warm booting. (02 marks)
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
(b) Give three circumstances under which a computer can be warm booted.
(03 marks)
(i) ……………………………………………………………………………
……………………………………………………………………………….
(ii) ……………………………………………………………………………
……………………………………………………………………………….
(iii) ……………………………………………………………………………
………………………………………………………………………………..
3. (a) What is Information and Communication Technology (ICT)? (02 marks)
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

2
(b) Outline any three measures that can be taken to prevent environmental
degradation through the use of ICT. (03 marks)
(i) …………………………………………………………………………………
(ii)…………………………………………………………………………………
(iii)………………………………………………………………………………..

4. (a) Give two reasons why file management is important in a computer system.
(02 marks)
(i) ……………………………………………………………………………
………………………………………………………………………………...
(ii) ……………………………………………………………………………
……………………………………………………………………………….

(b) List three operations which can be performed on a file. (03 marks)

(i) ………………………………………………………………………….
(ii) ………………………………………………………………………….
(iii) ………………………………………………………………………….

5. (a) Explain the term troubleshooting as used in computers. (02 marks)


……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
(b) State three ways in which one can troubleshoot a computer that has failed to
start. (03 marks)
(i) ……………………………………………………………………………
……………………………………………………………………………….
(ii) ……………………………………………………………………………
……………………………………………………………………………….
(iii) ……………………………………………………………………………
………………………………………………………………………………...

3
6. (a) Define an input device. (01 mark)
……………………………………………………………………………………
……………………………………………………………………………………
(b) Name two basic input devices associated with common desktop computers.
(02 marks)
(i)……………………………………………………………………………………..
(ii)…………………………………………………………………………………….
(c) Identify an input device for each of the following data. (02 marks)
(i) Sound……………………………………………………………………………...
(ii) Images……………………………………………………………………………

7. Outline any three functions of an operating system. (03 marks)


(i) ……………………………………………………………………………
…………………………………………………………………………………..
(ii) ……………………………………………………………………………
…………………………………………………………………………………...
(iii) ……………………………………………………………………………
…………………………………………………………………………………..
(b) Name any two operating system softwares. (02 marks)
(i) ………………………………………………………………………….
(ii) ………………………………………………………………………….

8. Ali has a DVD full of data and would like to transfer the data to CDs. The
capacity of the DVD is 4.7 GB and each CD is 700MB. Calculate the
number of CDs he would need to transfer all his data. (05 marks)
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………

4
9. (a) Define the term Tailor-made software. (01 mark)
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
(b) Outline any four qualities of good application software. (04 marks)
(i) ……………………………………………………………………………
……………………………………………………………………………….
(ii) ……………………………………………………………………………
……………………………………………………………………………….
(iii) ……………………………………………………………………………
………………………………………………………………………………..
(iv) ……………………………………………………………………………
………………………………………………………………………………..
10. (a) Write the following computer abbreviations in full. (02 marks)
(i) CPU…………………………………………………………………….
(ii) ALU……………………………………………………………………

(b) State the role of each of the following CPU components. (03 marks)

(i) Bus………………………………………………………………………..
………………………………………………………………………………..

(ii) Control Unit……………………………………………………………..


………………………………………………………………………………..

(iii) Registers………………………………………………………………

………………………………………………………………………………

11. (a) Distinguish between utilities and application software. (02 marks)
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………

5
(b) Give three examples of utility programs. (03 marks)
(i) …………………………………………………………………………………
(ii)…………………………………………………………………………………
(iii)………………………………………………………………………………..

12. Explain the following as applied to Internet:


(a) Hotspot. (02 marks)
…………………………………………………………………………
…………………………………………………………………………
…………………………………………………………………………
(b) Internet Service Provider. (01 mark)
…………………………………………………………………………
…………………………………………………………………………
(c) Search Engine. (02 marks)
…………………………………………………………………………
…………………………………………………………………………
………………………………………………………………………….

13. Give five symptoms of a computer infected by a virus. (05 marks)


(i) ……………………………………………………………………………
………………………………………………………………………………..
(ii) ……………………………………………………………………………
………………………………………………………………………………
(iii) ……………………………………………………………………………
………………………………………………………………………………..
(iv) ……………………………………………………………………………
………………………………………………………………………………..
(v) ……………………………………………………………………………
………………………………………………………………………………..

6
14. (a) Give two reasons to justify ownership of institutional websites.
(02 marks)
(i) ……………………………………………………………………………
……………………………………………………………………………….
(ii) ……………………………………………………………………………
………………………………………………………………………………..

(b) (i) What is a web browser. (01 mark)

………………………………………………………………………………
……………………………………………………………………………….
(ii) Under what circumstances can someone use a Uniform Resource
Locator (URL) in a web browser? (02 marks)

………………………………………………………………………………
………………………………………………………………………………
……………………………………………………………………………….

15. Give any five advantages of using automation in an industry. (05 marks)
(i) ……………………………………………………………………………
……………………………………………………………………………….
(ii) ……………………………………………………………………………
………………………………………………………………………………...
(iii) ……………………………………………………………………………
……………………………………………………………………………….
(iv) ……………………………………………………………………………
……………………………………………………………………………….
(v) ……………………………………………………………………………
……………………………………………………………………………….
16. (a) Define data communication. (01 mark)
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
7
(b) State any four requirements for setting up a computer network. (04 marks)
(i)………………………………………………………………………………
(ii)………………………………………………………………………………
(iii)………………………………………………………………………………
(iv)……………………………………………………………………………….

17. For questions (a)-(e), fill in the missing words from the list below:(05 marks)

Formula bar Worksheet


Active cell Workbook
Cell Column

(a) The………………………………...is the intersection of a column and a row.


(b) The content of a current cell is also displayed in the…………………………
(c) The …………………………is one with a thicker boundary and is the
insertion point in a spreadsheet.
(d) The cell address of the current is displayed in the……………………….
(e) A spreadsheet file is referred to as………………………………………..

18. (a) Give three disadvantages of electronic communication. (03 marks)


(i) ……………………………………………………………………………
……………………………………………………………………………….
(ii) ……………………………………………………………………………
……………………………………………………………………………….
(iii) ……………………………………………………………………………
………………………………………………………………………………..

(b) Name any two manual communication methods. (02 marks)

(i) …………………………………………………………………………………

(ii)…………………………………………………………………………………

8
19. (a) Give two situations under which electronic presentations would be used.
(02 marks)
(i)………………………………………………………………………………
………………………………………………………………………………...
(ii)……………………………………………………………………………
………………………………………………………………………………...
(b) State three advantages of using electronic presentations over the traditional
chalk and talk. (03 marks)
(i)…………………………………………………………………………………
……………………………………………………………………………………
(ii)…………………………………………………………………………………
……………………………………………………………………………………
(iii)………………………………………………………………………………
……………………………………………………………………………………

20. (a) Differentiate between intranet and extranet. (02 marks)


………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
……………………………………………………………………………….
(b) Define a Local Area Network (LAN). (02marks)
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
(c) Suggest an area network which is restricted to connecting users in a city.
(01 mark)
……………………………………………………………………………………….

END

9
Candidate’s name……………………………………………………………...
Random No. Personal No.
Signature ……………………………………….

(Do not write your school/Center Name or Number anywhere on this booklet)

S850/1
Subsidiary Information
and Communication
Technology
Paper 1
Nov./Dec.2019
2 ⁄ hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
Paper 1
2 hours 30 minutes

INSTRUCTIONS TO CANDIDATES:

Answer all questions in this paper

This paper is made up of twenty equally weighted questions

All answers should be written in blue or black ink in the spaces provided in the
question paper

For Examiners ‘ Use Only


1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

©2019 Uganda National Examinations


1 Board
Turn Over
Answer all questions in this paper

1. (a) Define a computer? (02 marks)


……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………

(b) Give any three peripheral devices of a desktop computer. (03 marks)

(i) ………………………………………………………………………
(ii) ………………………………………………………………………
(iii) ………………………………………………………………………
2. (a) State one reason why a computer laboratory should have: (03 marks)
(i) A good lighting system.

……………………………………………………………………………
……………………………………………………………………………..

(ii) A well ventilated environment.

……………………………………………………………………………
…………………………………………………………………………….

(iii) Appropriate furniture.

……………………………………………………………………………
…………………………………………………………………………….

(b) Give two measures a computer laboratory technician should put in place
to improve on the electricity power security. (02 marks)

(i) ………………………………………………………………………
……………………………………………………………………………..
(ii) ………………………………………………………………………
……………………………………………………………………………..

2
3. Outline the negative impact of ICT on the following sectors;
(a) Economic sector. (02 marks)
(i) ………………………………………………………………………
…………………………………………………………………………….
(ii) ………………………………………………………………………
……………………………………………………………………………..
(b) Social sector. (03 marks)
(i) ………………………………………………………………………
……………………………………………………………………………
(ii) ………………………………………………………………………
…………………………………………………………………………….
4. (a) Describe the booting process of a computer. (03 marks)
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
…………………………………………………………………………….

(b) State two possible consequences a computer may encounter whenever


improper shut down is done. (02 marks)

(i) ………………………………………………………………………
……………………………………………………………………………..
(ii) ………………………………………………………………………
…………………………………………………………………………….
5. Identify the following input devices:

A B C D E
3
A. ……………………………………………………………………………..
B. ……………………………………………………………………………..
C. ……………………………………………………………………………..
D. …………………………………………………………………………….
E. ……………………………………………………………………………..
6. (a) Differentiate between system files and Document files. (02 marks)
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………..

(b) Give three circumstances under which the computer user may choose the
option save as from a file menu. (03 marks)

(i) ………………………………………………………………………
…………………………………………………………………………….
(ii) ………………………………………………………………………
…………………………………………………………………………….
(iii) ………………………………………………………………………
…………………………………………………………………………….
7. (a) Distinguish between primary storage and secondary storage.
(02 marks)
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………..

(b) Name one example of primary storage and two examples of secondary
storage.

(i) Primary ………………………………………………………


(01 mark)

4
(ii) Secondary ……………………………………………………….
……………………………………………………….
(02 marks)
8. (a) Describe a Graphical User Interface (GUI). (02 marks)
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………..

(b) State one function of each of the following desktop icons. (03 marks)

(i) My computer.
……………………………………………………………………………
…………………………………………………………………………….
(ii) Recycle bin.

……………………………………………………………………………
…………………………………………………………………………….

(iii) My documents.

……………………………………………………………………………
…………………………………………………………………………….

9. Define the following terms in relation to computer data processing:


(a) Processor speed. (02 marks)
……………………………………………………………………………………
……………………………………………………………………………………
…………………………………………………..………………………………..
(b) Fetching. (01 mark)
……………………………………………………………………………………
………………………………………………………….………………………...

5
(c) Decoding. (02 marks)

……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………..…………….

10. (a) Explain any two elements of the “off-the-shelf” software. (04 marks)
(i) ………………………………………………………………………
……………………………………………………………………………
…………………………………………………………………………….
(ii) ………………………………………………………………………
……………………………………………………………………………
…………………………………………………………………………….

(b) Give one example of the “off-the-shelf” software. (01 mark)

……………………………………………………………………………………

11. (a) List any two requirements for Internet connection. (02 marks)
(i) ………………………………………………………………………
(ii) ………………………………………………………………………

(b) Outline three advantages of Internet connection. (03 marks)

(i) ………………………………………………………………………
(ii) ………………………………………………………………………
(iii) ………………………………………………………………………
12. (a) State one function of each of the following utility programs:
(i) Diagnostic utility. (03 marks)

……………………………………………………………………………
…………………………………………………………………………….

6
(ii) File Compression Utility.

……………………………………………………………………………
……………………………………………………………………………..

(iii) Antivirus utility.

……………………………………………………………………………
…………………………………………………………………………….

(b) Outline two ways of reducing the spread of computer viruses. (02 marks)

(i) ………………………………………………………………………
……………………………………………………………………………..
(ii) ………………………………………………………………………
……………………………………………………………………………..
13. (a) Write WWW in full as used in Internet technology. (01 mark)
……………………………………………………………………………
…………………………………………………………………………….

(b) Distinguish between a Web browser and a Search engine. (02 marks)

……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………..

(c) Give an example of a: (02 marks)


(i) Web browser………………………………………………………..
(ii) Search engine……………………………………………………….
14. (a) Differentiate between IP address and Domain name. (02 marks)
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
…………………………………………………………………………….
7
(b) Describe each of the following protocols in relation to data
communication:

(i) Simple Mail Transfer Protocol (SMTP). (01 mark)

……………………………………………………………………………
……………………………………………………………………………..

(ii) Post Office Protocol (POP). (01 mark)

……………………………………………………………………………
…………………………………………………………………………….

(iii) Hyper Text Transfer Protocol (HTTP). (01 mark)

……………………………………………………………………………
……………………………………………………………………………..

15. (a) Outline any three violation of computer ethics usage by computer users.
(03 marks)
(i) ………………………………………………………………………
…………………………………………………………………………….
(ii) ………………………………………………………………………
……………………………………………………………………………..
(iii) ………………………………………………………………………
……………………………………………………………………………..

(b) Suggest two measures that should be put I place to guard against
information pivacy in an organization. (02 marks)

(i) ………………………………………………………………………
……………………………………………………………………………..
(ii) ………………………………………………………………………
……………………………………………………………………………..

8
16. List five elements of data communication. (05 marks)
(i) ………………………………………………………………………
(ii) ………………………………………………………………………
(iii) ………………………………………………………………………
(iv) ………………………………………………………………………
(v) ………………………………………………………………………

17. The table below shows a budget for an introduction ceremony.

(a) Which computer application was used to design the given budget?
(01 mark)
……………………………………………………………………………..
(b) Identify the cell formatting feature which was applied to contents in the
D1 and E1. (01 mark)
……………………………………………………………………………..

(c) Write down the formula that would be used to compute:


(i) TOTAL COST in shillings (Shs). (01 mark)

……………………………………………………………………………..

(ii) TOTAL COST in pounds (£). (Use the exchange rate in cell B7).
(02 marks)

……………………………………………………………………………..

9
18. Describe any five tasks that are performed by digital forensic specialists.
(05 marks)
(i) ………………………………………………………………………
……………………………………………………………………………..
(ii) ………………………………………………………………………
…………………………………………………………………………….
(iii) ………………………………………………………………………
……………………………………………………………………………..
(iv) ………………………………………………………………………
…………………………………………………………………………….
(v) ………………………………………………………………………
……………………………………………………………………………..
19. (a) State the use of each of the following features in a presentation:
(03 marks)
(i) Slide looping.

……………………………………………………………………………
…………………………………………………………………………….

(ii) Slide transition.

……………………………………………………………………………
…………………………………………………………………………….

(iii) Hyperlinks.

……………………………………………………………………………
…………………………………………………………………………….

(b) Give one advantage of using the following on presentation. (02 marks)

(i) Handouts.

……………………………………………………………………………
……………………………………………………………………………..

10
(ii) Note pages.

……………………………………………………………………………
…………………………………………………………………………….

20. (a) Outline any two uses of a server in a computer network. (02 marks)
(i) ………………………………………………………………………
……………………………………………………………………………..
(ii) ………………………………………………………………………
……………………………………………………………………………..

(b) Name three types of computer networks. (03 marks)

(i) ………………………………………………………………………
(ii) ………………………………………………………………………
(iii) ………………………………………………………………………

END

11
Candidate’s name…………………………………………………………
Random No. Personal No.
Signature ……………………………………….

(Do not write your school/Center Name or Number anywhere on this booklet)

S850/1
Subsidiary Information
and Communication
Technology
Paper 1
Nov./Dec.2020
2 ⁄ hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
Paper 1
2 hours 30 minutes

INSTRUCTIONS TO CANDIDATES:
For Examiners’s Use Only
Questions
This paper is made up of twenty equally Marks Initials
weighted questions 1-2
3-4
Answer all questions in this paper 5-6
7-8
All answers should be written in blue or 9-10
black ink in the spaces provided in the 11-12
question paper 13-14
15-16
17-18
19-20
Total
1
©2020 Uganda National Examinations Board Turn Over
Answer all questions in this paper.

1. (a) Suggest one way of opening an application program. (01 mark)


……………………………………………………………………………………….
(b) A computer literate person is (01 mark)
………………………………………………………………………………………
………………………………………………………………………………………..
(c) Write three reasons why Information and Communication Technology is
important. (03 marks)
(i) …………………………………………………………………………
…………………………………………………………………………………
(ii) …………………………………………………………………………
…………………………………………………………………………………
(iii) …………………………………………………………………………
…………………………………………………………………………………
2. (a) Give any two ways to protect a computer from electrical damage. (02 marks)
(i) …………………………………………………………………………
…………………………………………………………………………………
(ii) …………………………………………………………………………
…………………………………………………………………………………

(b) Suggest any two measures you would take to prevent loss and/or damage of
data in computers. (02 marks)
(i) …………………………………………………………………………
…………………………………………………………………………………
(ii) …………………………………………………………………………
…………………………………………………………………………………

(c) Give one reason why computers should be serviced. (01 mark)
…………………………………………………………………………………
…………………………………………………………………………………

2
3. (a) Explain the term Short Cut as used in computers. (02 marks)
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………

(b) Identify three limitations of using the desktop as a sole file storage
location/directory. (03 marks)
(i) …………………………………………………………………………
…………………………………………………………………………………
(ii) …………………………………………………………………………
…………………………………………………………………………………
(iii) …………………………………………………………………………
…………………………………………………………………………………

4. (a) A specialized device that moves the pointer on a computer is called the.
(01 mark)
…………………………………………………………………………………
(b) Name two devices that serve as both input and output devices. (02 marks)
(i) …………………………………………………………………………..
(ii) …………………………………………………………………………..

(c) What device can be used to capture information shown in the picture below?

……………………………………………………………………………….

5. Give examples of software under the following categories:


3
Turn Over
(a) System utility. (02 marks)
Examples; (i) …………………………………………………………..
(ii) …………………………………………………………..
(b) Operating Systems; (02 marks)
Examples; (i) …………………………………………………………..
(ii) ………………………………………………………….
(c) Programing Languages. (01 mark)
Example……………………………………………………………………….
6. (a) Describe the term blog as used in Internet. (02 marks)
…………………………………………………………………………………
…………………………………………………………………………………
………………………………………………………………………………..
(b) Explain the term Cloud Computing. (02 marks)
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
(c) Give one advantage of cloud computing. (01 mark)
…………………………………………………………………………………
…………………………………………………………………………….......

7. (a) Write LAN in full. (01 mark)


………………………………………………………………………………..

(b) Explain the following network models:


(i) Client-server. (02 marks)
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………

4
(ii) Peer-to-Peer. (02 marks)

…………………………………………………………………………………
…………………………………………………………………………………
………………………………………………………………………………..

8. Identify five emerging technologies and innovations in the area of transport.


(05 marks)
(i) …………………………………………………………………………………
(ii) …………………………………………………………………………………
(iii) …………………………………………………………………………………
(iv) …………………………………………………………………………………
(v) …………………………………………………………………………………

9. The screen below shows a database object.

(a) Name the database object shown. (01 mark)


…………………………………………………………………………………
(b) Identify the field which would serve as a primary key. (01 mark)
…………………………………………………………………………………
(c) Assign appropriate data types for the following fields. (03 marks)
(i) Parents Tel: ……………………………………………………………
(ii) Matron remarks:………………………………………………………
(iii) Std_No:…………………………………………………………………
Turn Over
10. (a) Describe the term digital divide. (02 marks)
5
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
………………………………………………………………………………..

(b) Outline any three indicators of digital divide. (03 marks)


(i) …………………………………………………………………………
…………………………………………………………………………………
(ii) …………………………………………………………………………
…………………………………………………………………………………
(iii) …………………………………………………………………………
………………………………………………………………………………..

11. (a) Distinguish between high level programming languages and low level
programming languages. (02 marks)
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
(b) Give three advantages of high level programming languages. (03 marks)
(i) …………………………………………………………………………
………………………………………………………………………………
(ii) …………………………………………………………………………
…………………………………………………………………………………
(iii) …………………………………………………………………………
…………………………………………………………………………………
12. (a) Outline any three advantages of a flash disk. (03 marks)

6
(i) …………………………………………………………………………
…………………………………………………………………………………
(ii) …………………………………………………………………………
…………………………………………………………………………………
(iii) …………………………………………………………………………
…………………………………………………………………………………
(b) Suggest any two ways of creating more storage space on a flash disk.
(02 marks)
(i) …………………………………………………………………………
…………………………………………………………………………………
(ii) …………………………………………………………………………
…………………………………………………………………………………

13. Write TRUE or FALSE against statement from (a) to (e) in the table below.
(05 marks)
STATEMENT TRUE/FALSE
(a) Image viewer utility displays content of graphics.

(b) Uninstaller removes a word document file from the


computer system.
(c) Disk defragmenter complies technical information about
hardware and software.
(d) Disk scanner detects and corrects problems on hard disk.
(e) Anti-virus utilities protect the physical access to the
computer.

14. (a) Explain the term Internet Service Provider (ISP). (02 marks)
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
Turn Over
……………………………………………………………………………………….
(b) Give three examples of web browsers. (03 marks)
7
(i) …………………………………………………………………………
(ii) …………………………………………………………………………
(iii) …………………………………………………………………………

15. Identify five wireless communication media which can be used to connect network
devices as follows:
(a) Within the same room. (02 marks)
(i) ………………………………………………………………………….
(ii) …………………………………………………………………………
(b) Between users in the same city. (03 marks)
(i) ………………………………………………………………………….
(ii) ………………………………………………………………………….
(iii) ………………………………………………………………………….

16. (a) What is hacking as applied in ICT? (01 mark)


…………………………………………………………………………………
…………………………………………………………………………………
(b) Explain the following internet crimes:
(i) Phishing. (02 marks)

…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………

(ii) Spamming. (02 marks)

…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………

8
17. The table below shows results from an ICT class extracted from a spreadsheet
application. Use it to answer questions (a) to (c).

A B C D E F
1 No. Name Assignment Test Examination Average
2 1 Peter 56 74 89
3 2 Lindah 82 45 85
4 3 Rayyam 100 95 90
5 4 Josephine 50 90 65
6 5 Musa 60 57 80
7 6 Amina 38 77 62

(a) Write the formula that can be used to determine the average score for Peter.
(02 marks)
…………………………………………………………………………………
…………………………………………………………………………………

(b) Describe the procedure you should follow to obtain the average scores of the
students using your formula in (a). (02 marks)
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
What function would you use to position the students? (01 mark)
…………………………………………………………………………………

18. Study the computer specifications in the table below and answer questions that
follow.
Computer specifications Computer
A B
Clock Rate 1.7GHZ 1.2GHZ
Random Access Memory 2GB 100MB
Hard Disk 200MB 5GB

(a) Identify the computer which is faster. (01 mark)


…………………………………………………………………………………

9
(b) State two reasons to support your answer in (a). (02 marks)
(i) …………………………………………………………………………
…………………………………………………………………………………
(ii) …………………………………………………………………………
…………………………………………………………………………………
(c) Identify the computer with a higher capacity and give the reason why.
(02 marks)
…………………………………………………………………………………
…………………………………………………………………………………
19. (a) Define the term software package /suite. (02 marks)
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………

(b) (i) Give one example of a software package /suite. (01 mark)

…………………………………………………………………………………

(ii) List any two components of your example in (b) (i). (02 marks)
…………………………………………………………………………………
…………………………………………………………………………………
20. (a) Name any two network communication devices. (02 marks)
(i) …………………………………………………………………………..
(ii) ………………………………………………………………………….

(b) Give any three advantages of computer networks. (03 marks)

(i) …………………………………………………………………………
…………………………………………………………………………………
(ii) …………………………………………………………………………
…………………………………………………………………………………
(iii) …………………………………………………………………………
………………………………………………………………………………..

10

END
Candidate’s name…………………………………………………………
Random No. Personal No.
Signature ……………………………………….

(Do not write your school/Center Name or Number anywhere on this booklet)

S850/1
Subsidiary Information
and Communication
Technology
Paper 1
Nov./Dec.2022
2 ⁄ hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
Paper 1
2 hours 30 minutes

INSTRUCTIONS TO CANDIDATES:
For Examiners’s Use Only
Questions
This paper is made up of twenty equally Marks Initials
weighted questions 1-2
3-4
Answer all questions in this paper 5-6
7-8
All answers should be written in blue or 9-10
black ink in the spaces provided in the 11-12
question paper 13-14
15-16
17-18
19-20
Total
1
©2022 Uganda National Examinations Board Turn Over
Answer all questions in this paper.

1. (a) Define a computer system. (02 marks)


…………………………………………………………………………………

…………………………………………………………………………………

(b) List three examples of portable computing devices. (03 marks)

(i) …………………………………………………………………………..

(ii) …………………………………………………………………………..

(iii) ………………………………………………………………………….

2. The properties of a folder are given below:


Type : File folder
Location : C:\User\Student1\Desktop
Size of the folder : 3.15MB
Size of the disk : 3.17 MB
Contains : 7 files

(a) State the storage medium for the folder. (01 mark)
…………………………………………………………………………………

(b) Convert the size of the folder to bytes. (02 marks)


…………………………………………………………………………………

…………………………………………………………………………………

(c) Identify the subfolder where the files are located. (01 mark)
…………………………………………………………………………………

(d) Write the path for the folder. (01 mark)


…………………………………………………………………………………

2
3. (a) State three qualities of a good printer. (03 marks)
(i) ………………………………………………………………………….

(ii) …………………………………………………………………………..

(iii) ………………………………………………………………………….

(b) Give one use of each of the following devices.


(i) Projector. (01 mark)
…………………………………………………………………………

………………………………………………………………………….

(ii) Speaker. (01 mark)


…………………………………………………………………………

…………………………………………………………………………

4. Indicate TRUE or FALSE for each of the following security measures in a


laboratory.
SECURITY MEASURE IN THE COMPUTER TRUE/
LABORATORY FALSE
(a) A computer laboratory equipment should be regularly
cleaned with spirit-based cleaning reagent.
(b) A surveillance camera protects computer laboratory assets
from theft.
(c) Uninterruptible Power Supply unit reduces the A.C. voltage
to a lower D.C. voltage.
(d) Water based fire extinguishers are the best for putting out
fire in a computer laboratory.
(e) An air conditioner regulates the computer laboratory room
temperature.

3
5. (a) Distinguish between System Software and Application Software.
(02 marks)
…………………………………………………………………………………

…………………………………………………………………………………

…………………………………………………………………………………

…………………………………………………………………………………

…………………………………………………………………………………

………………………………………………………………………………..

(b) List any three categories of system software. (03 marks)


(i) ………………………………………………………………………….

(ii) ………………………………………………………………………….

(iii) …………………………………………………………………………

6. (a) Explain the term Netiquette as used in Internet. (02 marks)


…………………………………………………………………………………

…………………………………………………………………………………

…………………………………………………………………………………

(b) Outline any three netiquettes of internet. (03 marks)


(i) …………………………………………………………………………

…………………………………………………………………………………

(ii) …………………………………………………………………………

…………………………………………………………………………………

(iii) …………………………………………………………………………

…………………………………………………………………………………

4
7. (a) Write BIOS in full. (01 mark)
…………………………………………………………………………..…….
(b) Explain the following booting processes:
(i) Cold booting. (02 marks)
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………..

(ii) Warm booting. (02 marks)

……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
…………………………………………………………………………….

8. (a) Name one example of a word processor. (01 mark)


…………………………………………………………………………………
(b) Explain the following views in a word processor.
(i) Print Layout. (02 marks)

…………………………………………………………………………………

…………………………………………………………………………………

…………………………………………………………………………………

…………………………………………………………………………………

(ii) Read /full screen mode. (02 marks)

……………………………………………………………………………

……………………………………………………………………………

……………………………………………………………………………

……………………………………………………………………………..
5
9. (a) Differentiate a repeater from a switch as basic networking devices.
(02 marks)
…………………………………………………………………………………

…………………………………………………………………………………

…………………………………………………………………………………

…………………………………………………………………………………

(b) Outline three factors an organization should consider in order to have a


Local Area Network. (03 marks)

(i) ………………………………………………………………………….

(ii) ………………………………………………………………………….

(iii) ………………………………………………………………………….

10. (a) Explain the term E-learning. (02 marks)


…………………………………………………………………………………

…………………………………………………………………………………

…………………………………………………………………………………

(b) Give three reasons for the increasing e-learning facilities in educational
institutions. (03 marks)

(i) …………………………………………………………………………

…………………………………………………………………………………

(ii) …………………………………………………………………………

…………………………………………………………………………………

(iii) …………………………………………………………………………

…………………………………………………………………………………

6
11. (a) Define the term information security. (01 mark)
…………………………………………………………………………………

…………………………………………………………………………………

(b) Describe any two ways of ensuring data and information security.
(04 marks)
…………………………………………………………………………………

…………………………………………………………………………………

…………………………………………………………………………………

…………………………………………………………………………………

12. (a) Identify the following secondary storage devices. (03 marks)
Storage Device Name of the device

(b) Outline two advantages of secondary storage devices. (02 marks)

(i) …………………………………………………………………………

(ii) ………………………………………………………………………….

7
13. (a) Explain the use of each of the following software below:
(i) Device drivers. (02 marks)
…………………………………………………………………………

…………………………………………………………………………

…………………………………………………………………………

…………………………………………………………………………

………………………………………………………………………….

(ii) Screen savers. (02 marks)


…………………………………………………………………………

…………………………………………………………………………

…………………………………………………………………………

…………………………………………………………………………

………………………………………………………………………….

(b) Name one example of an anti-virus software. (01 mark)

…………………………………………………………………………………

14. (a) Write Bcc in full. (01 mark)

…………………………………………………………………………………

(b) Describe how you can use email services to do the following:
(i) Send a file from a storage device. (02 marks)
…………………………………………………………………………………

…………………………………………………………………………………

…………………………………………………………………………………

…………………………………………………………………………………

………………………………………………………………………………..

8
(ii) Send an email message you received to another person. (02 marks)
…………………………………………………………………………………

…………………………………………………………………………………

…………………………………………………………………………………

…………………………………………………………………………………

15. (a) Explain the concept Artificial Intelligence. (02 marks)


…………………………………………………………………………………

…………………………………………………………………………………

…………………………………………………………………………………

………………………………………………………………………………..

(b) State three ways in which one can use the Global Positioning System (GPS).
(03 marks)
(i) …………………………………………………………………………

…………………………………………………………………………………

(ii) …………………………………………………………………………

…………………………………………………………………………………

(iii) …………………………………………………………………………

………………………………………………………………………………..

16. (a) Explain the following terms as used in databases:


(i) Primary key. (02 marks)

…………………………………………………………………………………

…………………………………………………………………………………

…………………………………………………………………………………

………………………………………………………………………………..

9
(ii) Record . (02 marks)
…………………………………………………………………………
…………………………………………………………………………
…………………………………………………………………………
………………………………………………………………………….

(b) Give one example of a database object. (01 mark)

…………………………………………………………………………………

17. (a) Define the term Communication Protocol in computer networking.


(02 marks)
…………………………………………………………………………………

…………………………………………………………………………………

…………………………………………………………………………………

(b) Give any two examples of Communication Protocol. (02 marks)


(i) ………………………………………………………………………….

(ii) ………………………………………………………………………….

(c) A network device that converts digital signals into analog and vice versa is
called a…………………………………………..…… (01 mark)

18. (a) List three functions of an operating system. (03 marks)


(i) …………………………………………………………………………

…………………………………………………………………………………

(ii) …………………………………………………………………………

…………………………………………………………………………………

(iii) …………………………………………………………………………

…………………………………………………………………………………

10
(b) Give two basic components of a Graphical User Interface (GUI). (02 marks)
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
19. (a) (i) What is wireless transmission? (02 marks)
…………………………………………………………………………
…………………………………………………………………………
…………………………………………………………………………
………………………………………………………………………….

(ii) Give an example of wireless transmission. (01 mark)

…………………………………………………………………………..

(b) Outline two benefits of wireless communication. (02 marks)

(i) …………………………………………………………………………
………………………………………………………………………….
(ii) …………………………………………………………………………
………………………………………………………………………….
20. (a) Suggest any two ways the speed of a computer can be improved. (02 marks)
(i) …………………………………………………………………………

…………………………………………………………………………

………………………………………………………………………….

(ii) …………………………………………………………………………

…………………………………………………………………………

………………………………………………………………………….

11
(b) Given the following ports; (03 marks)
 Serial
 Universal Serial Bus
 Network
 Parallel

Identify from the list, the appropriate port for each of the given users below :

(i) The port that transmits data, a byte at a time is a


……………………………………………………port.
(ii) The port that transmits data only a single bit at a time is a
………………………………………………….port.
(iii) The port on a computer where the RJ-45 connector is attached is a
…………………………………………………….…port.

12
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
UNEB UACE SAMPLE PAPER 2013
MARKING GUIDE

1. (a). Modern computers transform data into information. The stages are:
 Data collection.
 Preparation of data
 Input of Data
 Processing of data
 Storage of data
 Output of results
(b) Identify one device that can facilitate any one of the stages listed above.
(01 mark)
 Input stage-Keyboard, Mouse, trackball, joystick, Microphone, Scanner
 Processing stage-Motherboard, Central Processing Unit, RAM Chips, ROM
Chips.
 Output of data-Monitor, Printer, Projector.
 Storage of data-Memory Cards, Flash disks, HDDs, CD&DVDs
2. State any five characteristics of a computer. (05 marks)
 High Speed: computer can perform millions (1,000,000) of
instructions and even more per second.
 High level of Accuracy: The degree of accuracy of computer is very
high and every calculation is performed with the same accuracy.
 Diligence: A computer is free from tiredness, lack of concentration,
fatigue, etc. They are very meticulous and are capable of doing and
repeating similar task without tiring or getting bored.
 Versatility: It has capability to perform completely different type of
work at the same time- multitasking, multi-programmable etc.
 Memory: The Computer has an in-built memory and we can store a
large amount of data during processing.
 Large storage Capacity: Unlike other data processors, computers
are capable holding large amounts of data for long time without
losing it through their storage media like; HDD, CDs, flash disks,
DVDs, etc.
 Artificial intelligence (AI): AI = Ability of computer to mimic human
thought. Computers are very intelligent devices and can receive
and respond to requests, and give the appropriate response.
 Automation and programmability: Computers receive and work on
instruction on their own. They work on minimal human intervention.
Page 1
3. (a) What is computer literacy. (02 marks)
The ability to use and apply computer skills so as to solve day to day problems.

(b) Servicing computers is an activity which should be done regularly. Give


three reasons why computers should be regularly serviced. (03 marks)
 Improve efficiency of the computer and its peripheral devices, b. To
prevent and or remove spyware and virus,
 To enable system upgrading to better versions,
 Allow system hardware and software
installations e. Carry out hardware and software
troubleshooting
 Replace tear and wear: both hardware [e.g hardware crash] and
software configurations.
 Carry out diagnostics on computer
operations h. Enable data recovery
4. (a) What is a folder in computer file management? (02 marks)
A file folder is an object [a collection of] multiple documents, files and other folders.
Refer to files of the same directory: a file is used interchangeably with directory.

(b) Identify the file extensions for the following files. (03 marks)
A word processor document e.g Ms word File extensions is .doc.
A spreadsheet file e.g Ms Excel is . xls
A presentation file e.g powerpoint is .ppt

5. The following are functions of the Operating System. Indicate True or


False. (05 marks)

Item Function of operating systems True or false


a) To process a word document False
b) To manage storage of documents False
c) To monitor system performance True
d) To administer security True
e) To enter data False

6. (a) With help of an example define a soft copy. (02 marks)


Soft copy is any file that exists and can be transmitted in digital and electronic form.
A document on computer that is not yet but may be printed.

Page 2
b). Judith can transfer the file to the computer lab by use of any of the
following devices:
 Flash disk drive
 Memory card drive
 CD-ROM drive
 DVD-ROM drive
 Blue Ray drive
 HDD-DVD drive
 Floppy diskettes
 Zip drive
 Magnetic tape drive
Item Hardware Function
a) Cache Memory A high speed memory built into the CPU that
temporarily store data during processing
b) Control unit [CU] Part of the CPU unit that co-ordinates its
operations
c) A register [R] A fast memory chip located on or near the CPU
unit to help speed up processing
d) A serial port Used to connect up to 127 peripheral devices to
a computer to a computer without additional expansion.

e) An Arithmetic Logic Part of the CPU that performs logical operations


Unit [ALU]

8. List five elements that can be displayed on the desktop screen of a


normal working computer. (05 marks)

 Icons for folders,


 system programs,
 Recycle bin,
Page 3
 shortcuts,
 Documents / files etc.
 Menus such as the start menu
 Files for various programs.
 My network places

9. (a) Distinguish between a Local Area Network and Wide Area Network.

Local Area Network (LAN). It is an inter–connection of computers which


are in a relatively close proximity. The size of LAN is typically inside a
building or at maximum inside a campus.
On the other hand, Wide Area Networks (WAN), is a network connecting
LANs across geographical distances. E.g. states and continents referred
widely as internet. This is the biggest of all networks.

(b) Give three advantages of computer networks. (03 marks)

 They facilitate sharing of peripherals devices. Facilitate Sharing of programs


and data files (resources).
 Better and enhanced communication and collaboration (networking).
 Better access to data bases and files for sharing through Uploading and
 Downloading receipt of files from host computer

10. What suitable application programs would you use to perform the
following tasks?

Item Explanation Application software name


a) To prepare an invitation letter Word processor e.g Ms Word,
b) To prepare a budget Spreadsheets software e.g Ms. Excel,open office Calc.

c) To produce business cards Desktop publishing software e.g Adobe InDesign, Ms


publisher
d) To prepare an employee data bank Databases e.g Ms. Access, MySql,
e) To prepare a presentation Presentation software e.g PowerPoint.

Page 4
11. (a) What is social networking website? (02 marks)
Any website that enables users to create public profiles, share resources within the
website and form relationships with other others. e.g Facebook, Skype, Telegram,
Whatsapp, Twitter.

(b) List two examples of social networking websites. (02 marks)

 Facebook
 Twitter
 Instagram
 Whatsapp
 Linkedn

(c) Sate one disadvantage of social networking websites. (01 mark)

 They release pornographic materials


 They are not secure- private information can easily leak to public by people
following you.
 They lead to social isolation.
 The lead to defamation.

12. Outline any five services that are offered by the internet service
providers. (05 marks)

 Chat rooms
 Instant messaging
 Email
 File sharing
 Video conferencing
 Message boards
 Internet telephony

Page 5
13. (a) State two advantages of using E-mails software over ordinary
postal letters. (02 marks)

 It is cheap- Reduces paper costs and irritation.


 It is convenient- E-mails can be conveniently sent to multiple recipients.
 It is very fast- instant.
 Very reliable because it is efficient and effective method of sending documents.
 Less risky- it is relatively safer than postal services- Secured by passwords.
 Increased Storage Capacity
 Can easily go across many time zones (continents).
 They offer provision for attachments.
 By providing a list of senders and subjects one can prioritize on which
 There is a possibility of multimedia mails where they can be received
 Provides immediate delivery feedback.

(b) What are the uses of the following features of E-mail software?
(i) To: (01 mark)
This show the email address of the recipient of the mail. It’s where you typeset
the E-mail address of the receiver
(ii) BCC. (02 marks)
Enables copies of the E-mail to be sent to a third party without acknowledging any
other recipients

14. Indicate True or False for the following statements. (05 marks)

Item Statement True or False


a) Visual Display units can be either in-put or storage device False
b) Out-put devices provide feedback to the users True
c) Dot-matrix printers produce better images that inkjet printers. False
d) Secondary storage media is volatile False
e) The more pixels per square inch on a computer monitor the higher the True
resolution

Page 6
15. (a) Define the term Bluetooth? (02 marks)
Bluetooth is a wireless technology standard for exchanging data over short
distances using short radio waves.
(b) Name any three networking protocols. (03 marks)

 Hyper Text Transfer Protocol(HTTP)


 Simple Mail Transfer Protocol(SMTP)
 Transmission Transfer Protocol/Internet Protocol(TCP/IP)
 File Transfer Protocol(FTP)
 Telnet

16. Identify one purpose of each of the following utilities.


(a) File Viewer. (01 mark)
Facility that helps to display various files to provide better viewing options for
proper doc. scrutiny.
(b)Disk Defragmenter. (01 mark)
Reorganizes & re-arrange the fragmented files and unused space on a hard disk so
that data is accessed more quickly.
(c) Diagnosis utility. (01 mark)
Compiles technical computer information & helps outline any identified problems;
checks for errors or bugs.
(d)Anti-virus. (01 mark)
Prevents, detects and removes viruses
(e) File Compression. (01 mark)
Facility that helps to reduce the size [number of bytes] of selected files to provide
more storage capacity to the disk eg Zip, Winzip etc.
17. (a) State any three computer security risk in the computer laboratory.
(03 marks)
 Virus attack/ infections that corrupt files
 Hard disk crash due to overheating, virus attack etc.
 Theft by robbers
 Power disconnection or interruptions- switch offs.
 Computer hackers in case the school runs a website.

Page 7
(b) Outline any two ways to enforce computer laboratory security.
(02 marks)
 Use of burglar proof doors, windows and locking systems
 Avoid dust in the lab by regular cleaning- mopping, sweeping, dusting of
shoes, woolen carpets etc.
 Avoid carrying food items- water etc in the computer laboratory
 Avoid use of storage devices like flash disks that are infected with virus
 Disable ports to avoid carrying thru flash disks into ur computer
 Installing updated anti-virus and Use of updated antivirus to avoid oss of data
and computer crash.
 Proper ventilation and installing air conditioners and fans
 Employ security guards to keep the computer lab safe from strangers
 Ensure steady supply of power e.g use of UPS [Uninterruptible
Power Supply], stand by generators.
 Scan all storage media like flash disks using updated anti-virus
18. Give one role of the following ICT specialists

(a) Database administrator. (01 mark)


Responsible for installation, configuration, upgrading, monitoring and
maintenance of organizations’ data base systems. Manages and supervises the
company’s database.

(b) Programmer. (01 mark)


Designs, develops, implements and create software/codes to operate computers and
for use as support or application software

(c) Computer Technician. (01 mark)


To carry out minor hardware / software installations and repairs

(d) System Administrator. (01 mark)


Manages and is responsible for configuration of computer systems [servers] by
upgrading, software installations and troubleshooting etc

(e) Computer instructor. (01 mark)


To teach and guide users on how to use computers and other related devices

Page 8
ID NUMBER EMPLOYEE NAME DOB TELEPHONE
NUMBER
U01 ARINDA RUTH 03/03/79 07724311224

U02 NAMBA PERUTH 23/11/8 0413556594

(a) Which suitable application package might have been used to capture
the information? (01 mark)

 Microsoft Acess
 My SQL
 Oracle

b) Name the data types for the following entries


(i) ID Number (01 mark)
Text/Auto number/Number
(ii) DOB (01 mark)
Date/Time.
(c) What is the appropriate primary key? (01 mark)
ID NUMBER
(d) How many records are shown in the table? (01 mark)
2 Records

20. (a) Define electronic publishing. (02 marks)


Refer to digital publication of electronic documents and or articles, books and or
development of digital libraries. b). Electronic publications include:

(b) Name any three electronic publications. (03 marks)

 E-mails
 E-books
 Online tutorials
 E-magazine
 E-bibles

Page 9
The table below shows specifications of two computers X and Y.
Computer specifications Computer X Computer Y
Processor Intel ® 3.2 Ghz Intel ® 3308Mhz
RAM 1GB 2000MB
Hard disk 4600MB 50GB
Monitor size 19” 15”

a) Which of the two computers would you recommend for a company to buy?
Computer X

b) State two reasons to defend your answer;


Higher processor speed 3.2 GHz
More random access memory 1GB

c) Which is the least important of the computer specifications given in the table?
Monitor size

d) State one reason defending your answer above.


Does not affect the output of work
Does not affect performance of the computer

2a) Explain how computers can professionally be used by:


i) Teachers
Collaboration tool and exchange of ideas
Tool for teaching and learning
Assess and grade learners
Store learners’ notes and marks

ii) Doctors
Monitoring patients
Medical consultation
Telemedicine
Therapy
Simulations
Medical research
Carrying out operations on body parts
Scanning for diseases
Prescriptions of drugs

b) State one health risk associated with continued usage of computers.


Germs from the keyboard
Eye defects
Repetitive strain injury
Techno stress
Body pains
Headaches
Fatigue
Wrist pains

3a) Explain the following terms in a spreadsheet


i) Values
Data that can be manipulated or calculated
ii) Labels
Text based entry that identifies data Non mathematical data
Words on column headings

b) Name a symbol used when writing functions in a spreadsheet.


Equal sign (=) or @ sign or plus sign (+)

4a) Give three devices that can be used to transfer files from one computer to another
Flask disk Zip disks
External hard disk Floppy diskettes
Compact disk Memory cards
Digital versatile disk Magnetic tapes
Blue ray disk

b) Explain the following methods of transferring a file from one location to another.
i) Drag
Method of moving a file or folder from one location on the screen to another by use of a mouse

ii) Copy
Method of creating a duplicate of a file or folder

5a) Give three factors a company should consider before buying any storage devices.
Storage capacity
Cost
Safety of media/nature of work to be stored
Compatibility of the media with system-IDE, SATA or USB
Brand/make/durability
Data access speed

b) How many kilobytes are in six megabytes per second?


1MB=1024KB 6MB=1024X6 6144kilobytes

6a) Give one use for each of the following computer devices
i) Power supply unit
Some have a fuse to protect the system
Convert AC from mains to DC used by the system
Receive and distribute power to different system parts in required voltages
Alternate power to regional voltage settings (110 or 240V)
Provide protection to user against electrical signals

ii) System case


Provide earthing for the system
Facilitate movement of the system as a unit
House the computer processing hardware
Protect internal components against dust, dirt and falling objects
Provide attachments for holding different units together
iii) CMOS battery
Powers up the CMOS chip which stores configuration information about the computer.

b) Explain the following


i) Analog device
Can measure, record, and reproduce continuous data/information
Receive data and information inform of changing phenomena

ii) Digital device


Receive and understand data and information in binary digits-0s and 1s
Generate, store, process data using discrete values-numbers and digits’

7a) State three types of computer software

Computer aided design (cad) Spread sheet software


software Word processing software
Multimedia software Paint/image editing software
Project management software Video and audio editing software
Personal information managers Web page authoring software
(PIM) Communication software
Presentation software Education software
Graphics processing software Personal finance software
Desktop publishing software Reference software
Database software Entertainment software

b) Differentiate between a software version and a release.


A software version is a major upgrade in a software product leading to even change in the
software interface and some procedures whereas a software release is the public or private
distribution of a new or upgraded version of a software product.

8a) State two internet based tools that support web based research.
Search engines like Google Online libraries/books like Google books
Web browsers Online encyclopedia like Wikipedia, Encarta
Hyperlinks Gopher

b) Identify three things one would require in order to get connected to the internet.
Any communication hardware like modems, routers, switch, hub
Communication software for browsing
Internet service provider for connection
Physical/wireless connection media
Network operating system
Phone/computer

9) Outline five factors which determine data transmission speeds over the internet.
Nature of material one is trying to access or send-graphics tend to load slowly
Bandwidth
Modem/routing device speed and positioning
Network data traffic at a time
Data transmission media
Environmental factors/natural conditions-rainy, cloud, stormy weather and thunder usually
affect transmissions negatively
Malfunction of computers-hardware problems-poor network card, video card or signal receiver
Computer processor speed
Malware, spyware and viruses-software problems-cookies
Memory available
Computer internet setting

10) Give five factors an organization should consider before choosing a local area
network (LAN) model.
Size of organization: a point to point is ideal for about ten users at a time
Networking budget: where server based networks demand much more money
Needs of the network itself: administrator servers
Level of data security needed: server based network models are more secure
Amount of traffic expected
Nature of business
Level of administrative support
Future needs of the organization-scalability

11a) Write the initial procedure of booting a computer system.


Switch on the mains
Switch on the UPS or stabilizer
Switch on the system unit
And finally switch on the monitor

OR
Switch on the mains
Switch on the UPS or stabilizer
Switch on the system unit and finally switch on the monitor
Power on self test is conducted by the BIOS
Bootstrap loads the OS into RAM
The desktop is activated

b) Give any two measures taken to ensure that computers in a laboratory are safe.
The computers should be properly switched on or off
Avoid illegal connections and disconnections
Avoid exposing computers to heat/direct sunlight
Keep away with bags
Foods and drinks should not be allowed in the computer laboratory
Keep the computers in a dust free environment
The repairs should be done by technical persons
The computers should be connected to the UPS or stabilizer
Keep fire extinguishers to guard against fires
Computers should be allowed to cool down before covering them
Lock the laboratory after use of computers
Use burglar proofing
Install and update antivirus
Have usernames and passwords to access the computers
Setup lightening arrestors to guard against thunder
Use firm tables to hold the weight of hardware
12a) A computer file is made up of a file name and a file extension.
i) What is the purpose of a file extension?
To identify the file type
Helps to organize files
Files can easily be located
Determine which program to open the file

ii) Write down the file extension for a word processed document.
.doc
.docx

b) In which two ways can an accidentally deleted file be recovered?


Restoring from the recycle bin
Use of the undo command
Use of recovery software
Drag from the recycle bin

13) Why would there be a need to replace CRTs with LCDs?


Portable
Releases less radiations
Consumes less power
Occupies less space
Can easily be mounted onto the wall
Has inbuilt antiglare screens

14. Indicate True or False against each statement in the table below.
True/false
a) Windows Xp is a graphical user interface operating system TRUE
b) Presentation software supports multimedia TRUE
c) Word processors have formula bars FALSE
d) Backup is to combine the content of two or more files to produce one output file FALSE
e) The disk operating system is menu driven FALSE

15) Write down any five advantages of using off-shelf applications.


Cheaper to buy
Easily available from many vendors
Thoroughly tested to eliminate bugs
Lots of user support-books, user guides, online help, discussion forums
Easy to learn and use (user friendly)
Can be customized
Easy to restore
Easy to share files
Used to perform several functions

16a) Explain the term software piracy.


Unauthorized duplication and use of computer software
b) Write down any three precautions taken to prevent software piracy.
Use of a code key/ serial
Sensitizing users on illegal use of software
Use of holograms-a component which comes with original copies and cannot be duplicated
Require software authentication and activation
Incorporate flexible licensing
Prosecute software pirates

17) The table below shows part of a database. Use it to answer the questions that follow.
EMP NO NAME TEL NO SALARY NO OF MONTHS TOTAL PAY
E227008 Betty 0774267820 $700,000 3
E227011 Kintu 0701998142 $400,000 4

a) Write down the data types entered in the following fields.


i) TEL NO Text
ii) SALARY Currency

b) Suggest a suitable primary key.


Employee No.

c) The formula entered in the design view to determine TOTAL PAY, which is a product of
SALARY and NO OF MONTHS is?
=[salary]*[No. of month] in the form
[salary]*[No. of month] in the query

18) State any five characteristics of a modern computer.


Speed
Accuracy
Versatile
Diligence
Storage
Automation
Artificial intelligence
Communicative

19) From the given terminologies used for internet and networks below, choose the correct
one to complete each of the statements that follow.

A discussion group Instant messaging Video conferencing


A chat room Online shopping Telephony

a) The type of internet communication that allows multiple users to exchange messages in
real time is called:
Chat room
b) The type of internet communication that enables individuals to post messages on a particular
topic for others to read and respond to is:
Discussion group
c) The use of multimedia technologies in communication is called:
Videoconferencing
20a) Explain the following terms as used in electronic mail
i) Blind carbon copy (BCC)
Used to hide an e-mail address so that none of the recipients can see whom you have sent the
message

ii) Carbon copy (CC)


Used when sending a copy to more than one address without hiding

b) State one requirement needed for one to send an e-mail.


Internet connection/network
Electronic mail account/address on any email provider sites and most of them are free for
platinum users for example Gmail
1a) Explain the term information and communication technology.

Information and communication technology is the combination of telecommunication and computer


technologies to enhance communication.

b) State three ways in which information technology has improved communication.

People in remote places use mobile phones to access telephone services.


ICT facilitates group discussions
People can communicate through e-mails
ICT facilitates chatting through chat rooms
Websites
Storage
Cheap
Teleconferencing
Video conferencing
Instant messaging
News groups
ICT enables people to send and receive fax messages

2) Give one reason why a school director would purchase the following equipment for a computer
laboratory.

a) Blower

To facilitate cleaning of computing equipment by removing dust from the equipment.

b) Anti-glare filter screens

To regulate excess light from monitors especially CRT monitors so as to reduce eye strain.

c) Air conditioner

To regulate temperatures and monitor air distribution in the computer laboratory.

3) During a practical examination, students were required to open a blank file and save it as
D:\STUDENT WORK\EOT PRACTICAL\safety.doc

a) State the name of the immediate subfolder in which students must save the file.

EOT PRACTICAL

b) Write the root directory onto which the file must be saved.

D:\ or D:

c) Suggest one example of a computer application the student can use to create the file.

Word processing software like Microsoft word


d) State the name of the file represented by the above file path.

safety.doc or safety

4) Study the devices below and answer questions that follow.


A B C D E

a) Name the devices labeled:

A Digital camera or camera


B Bar code reader
C Scanner or flatbed scanner

b) Give one major similarity between devices A and E.

Both are input devices


Both are used to feed data into a computer for processing

c) Identify one device which can be categorized as an output device.

Device D (speakers)

5) Read the statements below and write the words TRUE or FALSE in the spaces provided.

STATEMENT TRUE/FALSE

a) Machine code is one of the low level computer languages TRUE

b) Microsoft is the only operating system in use in Uganda FALSE

c) WINZIP is an example of a system software which reduces the actual TRUE


size of a file

d) A student delivering a presentation would need an LCD projector and TRUE


a laptop

e) Screen savers can be categorized as desktop publishing software since FALSE


they can be used for advertising purposes
6a) State any two adverse effects of using internet for business and communication

Identity theft Pharming


Hacking Illegal taping
Cracking Piracy
Internet based fraud Eavesdropping
Sabotage Plagiarism
Cyber terrorism Loss man hours
Masqueraders Altering
Phishing Virus infections

b) Suggest the most appropriate internet communication service in the following situations:
i) Online meetings between two company employees in geographically separated regions.

Video conferencing Teleconferencing Instant messaging

ii) Instant and real time communication between friends.

Internet relay chats or chat rooms Instant messaging

iii) Typed views on an on-going online discussion amongst a specific group of people.

Discussion groups or discussion forum or discussion fora

7a) Identify any three devices other than computers required to set up a network within a school
environment.

Network interface cards Hubs Wireless access points


Router Switches Bridges
Repeater Ethernet cables Transmission media

b) Distinguish between data communication and networking.

Data communication refers to one computer transferring data, information and instructions to
another computer or other computers on a communications channel whereas networking is the
linking or connecting of two or more computers to share resources.

8a) List any three possible threats to data in a computer networked environment.

Unauthorized access or cracking or hacking


Computer virus infection
Information theft
Data encryption
Change of file names
Adding a password
Data deletion
Plagiarism
Pharming
Change of file location or hiding of files
b) Name any two types of security measures which can be used to control the threats listed in (a) above.

Strong passwords and usernames


Activating firewalls
Use of biometric devices
Data encryption
Prosecuting suspected culprits
Sensitize users about data safety measures

9) Given below is a notice which a head girl has typed and intends to pin up on all the notice boards in
the school.
THE REGIONAL SWIMMING GALA
ON 22nd NOVEMBER 2014
FEEE: 5000
REGISTER WITH HEADGIRL

Explain any five word processing features which the head girl would use to enhance the appearance of
the above notice.

Bolding to make the text more obvious Background colour


Font size Line spacing
Alignment Italics
Font type Text highlighter
Underline Clip art

10a) Suggest one way in which computers have been made user-friendly for persons that are physically
challenged in the following areas:

i) Without hands

Voice recognition devices for data input


Use of biometric devices instead of typing passwords
Use of sensors

ii) Impaired vision

Use of sensors
Braille keyboards or data written in braille
Use of projectors
Audio enabled keyboards
Voice recognition devices for data input
Use of biometric devices instead of typing passwords

b) Give three health issues that may be caused by the prolonged use of computers.

Eye defects Neck pain


Repetitive strain injury Back pain
Techno stress Fatigue
Body pain Germs from the keyboard
Headaches
11) Choose the appropriate file extensions from the list given for sentences (a) to (e).
.doc .txt .tif .bat .sys

a) Program files that perform fundamental operations in a computer.

.sys

b) A Microsoft word file.

.doc

c) A file containing series of commands during boot up.

.bat

d) A plain file created using note pad.

.txt

e) A graphical file created using applications such as Adobe Photoshop.

.tif

12a) State any three operations of the machines cycle of a central processing unit.

Fetching Execution
Decoding Storing

b) Describe any one of the operations stated in (a) above.

Fetching-obtaining a program instruction from memory


Decoding-translating instructions into commands a computer can handle
Execution-undertaking processing tasks
Storing –transferring results of processing into memory from CPU

13a) A set of instructions that are arranged in a logical way to run a computer is called:

Computer software or system software or a program

b) List any three categories of system software.

Operating system Utilities/service programs/system utilities


Programming languages

c) Give one example of presentation software.

Microsoft PowerPoint Kingsoft presenter Lotus freelance


Open office presentation Google slides
14a) Give three benefits of connecting computers to the internet

E-mails Instant messaging


Backup or online storage E-governance
E-commerce E-publications
File download or upload Online games
Discussion groups Software update
Weather forecast information Social networking
E-learning Telecommuting
Access to news Collaborative research
Online booking and reservations

b) Outline two disadvantages of connecting computers to the internet

Information theft Additional costs


Computer viruses Exposure to pornography
Hacking Deprives one of privacy
Cracking

15) Explain why an organization would prefer to use electronic mail (E-mail) over ordinary mail.

One can send any size of messages just at the cost of a local call.
They can be sent at any time and the results are almost simultaneous because the messages reach
their destinations after a short time.
Electronic mails are highly efficient.
They save a lot of time for example you can present a report at a conference by going to it and
downloading it from the conference.
Saves time, paper, and money compared to the telephone or written letters
The recipient may read the message anytime
Allows you to communicate easily with many people at once
Allows you to thoughtfully compose what you would like to say
Ability to send to multiple recipients at the same time.
It is very easy to send a reply to an e-mail as soon as it is received by using a reply button.
Large files such as spreadsheets and graphics can be sent as attachments
Can be used for advertisements
Assurance of whether the mail has been delivered is given
No use of stamps
Convenient when retrieving and delivering

16) Outline five areas of self-employment that a sub ICT student can engage in.

Offering software support Video editing


Print publications/create/ Advert designer Computer secretarial bureau
Photocopying and typesetting Computer vendor or dealer
Writing CDs Digital money transfer dealing
Music mixing Teaching ICT
Internet café management Computer servicing and repair
17) Use the terms below to complete the sentences that follow in (a)-(e)
• Slide transition • Slide design
• Slides • Slide show
• Animation effect • Slide master
• Slide layout • Handouts

a) The visual movement from one slide to another slide is slide transition.
b) The animation effects setup the way text/objects appear on a slide during a presentation.
c) The presentation of slides in a sequence on a projection screen is referred to as slide show.
d) The slide layout defines the arrangement of all items that make up a slide.
e) A user can print the entire presentation on one page by printing the handouts.

18a) State one difference between a compact disc (CD) and a digital versatile disc (DVD)

DVDs have higher storage capacity than CDs


DVDs are cheaper per unit data storage
DVDS guarantee higher quality features (sound and video)
CDs are cheaper (cost) than DVDs
Reading and writing CDs is faster than on DVDs

b) Explain the circumstances under which the following storage devices are used.

i) Memory card

When data has to be read from small electronic devices like phones, PDAs and palmtops
When there is a likelihood of making changes to files
When there is need to access files on various electronic devices
When there is need to transfer files from one device to another
When you have a memory card reader

ii) Flash disk

When there is need to access files on various electronic devices with USB ports
When files have to be kept for a long time (quickly and easily backup files)
When more files have to be added from time to time
When there is need create a boot disk

19a) Describe the following terms in programming languages


i) Interpreters

Interpreters are programs that read one of the source language instructions line by line and change
it into machine language when the program is running.

ii) Syntax

The grammar of a programming language

iii) Debugging

Detection and removal of syntax and logical errors in a program.


b) Identify two characteristics of a good programming language.

Suitability to the problem


Availability
Clarity and simplicity
Consistency
Efficiency
User friendliness

20) Using the e-mail address: [email protected], identify what these parts stand for:

a) annet

User name
User
User ID
Unique ID

b) @

Symbol that separates the e-mail user name from the rest of the address

c) gmail

Domain name
The service provider
Server name

d) .com

Organization name (where the e-mail account is held)


Top level domain (type of domain where the e-mail account is held)

END
1a) Distinguish between Random access memory (RAM) and secondary storage

RAM is the working area for the computer user that provides temporary storage for data, programs when
the computer is running whereas secondary storage is a kind of storage that provides a relatively
permanent for of storage for data and information when the computer is running or even when the
computer is turned off.

b) Give an example of secondary storage.

Floppy diskette Compact disks (CD)


Magnetic tape Digital video disks (DVD)
Zip disk Memory cards
Jaz disks Smart cards
Hard disk Flash disks
Microfiche and microfilm

2) Explain each one of the following database features.

a) Field name
Database feature assigned to each field to identify the different fields.

b) Field properties
Determine how data is handled, stored and manipulated
Further define data types and formats like field size, default values

c) Data type
Specify the kind of data a field can contain and how the field is used.

3a) Distinguish between computer servicing and computer repair

Computer servicing is the caring for a computer to preserve it in a good working condition and to prevent
damage while computer repair is the restoring of a computer to an acceptable condition by removing and
then replacing or mending of damaged parts.

b) Write one reason for having the following items in the computer laboratory.

i) Woolen carpet
Absorbs moisture from the floor
Absorbs sounds from movements
Protects devices from damage when they fall
Protects users from electrocution
Absorbs dust and prevents it from entering the computers

ii) Blower
Removing dust from computer parts

iii) CCTV cameras


Record and playback activities for reference purposes
Surveillance-act as a deterrent to theft and other crimes
Monitor security at data centers
4a) Don is a new computer user. As an ICT student advise Don on which tool to use:

i) To trace files he cannot locate


Search from startup menu
Run on startup
Use search utilities like AVA find and search everything

ii) To trace a word from an open document


Find
Search

b) A student is typing a document using Microsoft Word. Write down three steps the student will
use to shut down the computer.
Save the document and close the document
Click on the start button
Choose turnoff or shut down

5) State five activities that can be performed on a computer when using a mouse piece.
Pointing at items Zooming windows
Dragging and dropping items Moving the pointer
Clicking Selecting or highlighting items/text
Double clicking Drawing images
Scrolling Creating shortcuts

6) Identify five ICT related employment opportunities in Uganda today.


Writing CDs Computer servicing and repairing
Music mixing Advert designing
Internet café management Computer laboratory attending
Video editing Switchboard operating
Computer secretarial bureau management Computer programming
Computer vendoring or dealing Software engineering
Digital money transfer dealing Network administering
Teaching ICT Servicing and repairing computers

7a) What is multiprocessing?


Involves the coordinated processing of tasks/programs by more than one processor

b) Give two advantages of each of the following operating systems.

i) Windows
Readily available on market
Software downloads, patches, fixes are available online
Supports networking
Supports multitasking
Compatible with almost all machines
Interoperable with most software
Easy to use since it supports many interfaces
Easy to learn
Light-takes little disk space
User support readily available online
ii) Linux
Supports networking
Supports multitasking
Interoperable with most software
Compatible with almost all machines
Free of charge
Flexible-users can change the code-open source
Resistant to viruses

8a) Name two examples of application software


Microsoft word SuperCalc Corel Ventura
Word pad Microsoft access QuarkXPress
Notepad D-base Broderbund Print Shop
AmiPro Fox pro Pro
Microsoft Excel Paradox Corel drawing
Corel Quattro pro Adobe in design Microsoft photo draw
Lotus 123 Adobe page maker Adobe photo shop
VisiCalc Microsoft publisher
Microsoft power point Macromedia flash
Corel presentations Microsoft front page
Lotus freelance graphics Windows and Nero media
Harvard graphics player
Microsoft outlook Power DVD
Corel CENTRAL Microsoft Encarta
Lotus organizer Mosby’s medical
Palm desktop encyclopedia
Corel catalyst Webster’s dictionary and
Microsoft project thesaurus
Primavera sure track Microsoft money
project manager Inuit quicken
Autodesk Auto CAD Encarta
Microsoft Visio technical Mavis Beacon Teaches
Macromedia author ware Typing
Macromedia director Web browsers
Macromedia flash E-mail software
Adobe illustrator Chat rooms
Paint photo shop Newsreader
Corel draw Video conferencing
Macromedia free hand software
Microsoft PhotoDraw Instant messenger
Adobe Photoshop Groupware
Meta creations painter Intuit QuickBooks
Adobe premiere Peachtree complete
Ulead media studio pro accounting
Ulead video studio
Fireworks
Adobe Go live
Adobe page Mill
Macromedia dream weaver
9a) What is the World Wide Web?
A global collection of electronic documents accessible through the internet

b) Show three ways in which the internet can facilitate trade and business.
Facilitates advertising
Facilitates business and trade communication
Facilitates online booking
Traders may pay online
Traders can exchange transaction documents online
Buyers can inspect documents online

10) Show one way in which the internet can be a danger to:

a) Morality
Exposure to pornography and illicit materials
Loss of respect to the elderly
May lead to juvenile delinquency
Young people may learn to take drugs
Decline in cultural norms and values

b) Labour
Loss of man-hours when workers surf at the expense of their work
Workers may do personal research wasting organizational resources
Internet may replace some workers rendering them jobless
Redundancy of workers when the internet connection fails
A lot of trickery and wrong information about jobs over the internet
Facilitates surveillance leading to loss of workers’ privacy
Loss of craftsmanship and creativity due to over reliance on computers

c) System security
Facilitates rapid spread of computer viruses
Illegal access from hackers and crackers
Facilitates phishing and pharming

d) Human security
Facilitates surveillance which leads to loss of privacy
Defamation
Identity theft
Cyber bullying
Cyber terrorism
Impersonation
Abusive and threatening messages

e) Information

Eavesdropping Wrong information


Computer viruses Change of data and information along
Plagiarism communication lines
Unreferenced information
11) Explain the following attributes of computers which make them dependable and reliable
tools.
a) Diligence
Computers can perform the same task over and over along period of time without getting tired.

b) Versatility
Computers can be used for many different tasks and can change from one task to another.
Computers can be used to perform completely different tasks at the same time or one at a time.

c) Accuracy
Computers are thorough/systematic/orderly once right instructions and data are entered.
Computers are so accurate that they hardly make mistakes.

12a) Describe the term computer literacy


Computer literacy refers to having the knowledge and understanding of computers and their uses.

b) Outline any three ways in which ICT can improve the quality of education.
Through e-learning that links schools and institutions
Through enabling multimedia usage which makes learning interesting
Saves educational costs
Facilitates educational research
Tool for teaching and learning
Enabling sharing and update of notes
Facilitates efficient information processing and communication

13a) Distinguish between copy a file and move a file.


Copy a file involves making a duplicate of a file while move a file involves changing the location of a
file/transferring a file from one location to another.

b) Study the file path below and answer the questions that follow.
F:\accounts\bursar\fees.xls
i) Identify the file name Fees or fees.xls

ii) On what drive is the file located? Drive F

iii) In which sub-folder is the file located? Bursar

14a) List any three input devices


Keyboard Digital camera
Mouse Bar code reader
Touchpad Digital video camera
Trackball Web camera
Stylus and graphics tablet PC camera
Joystick Electronic whiteboard
Microphone Magnetic stripe reader
Light pen Optical mark recognition (OMR) reader
Pointing stick Magnetic ink character recognition (MICR)
Scanner reader
MIDI device Optical character recognition (OCR) reader
Sensor and remote sensor Touch screen
b) Give a function of any two input devices listed above.
A PC camera allows home users to record, edit and capture video and still images and to make phone
calls on the Internet.
Digital cameras record images digitally on a disk rather than on a film and the images are transferred
or downloaded onto the computer.
Digital video cameras record motion digitally on a disk and have the capability to take still images as
well.
A pointing stick is located in the middle of the keyboard and to control the pointer, you direct the stick
with your finger.
A touch pad is used to control the pointer by moving and tapping your finger on the surface of a pad.
A trackball is used to control the pointer by rotating a ball with your thumb.
A light pen is a light sensitive pen-like device that is placed against the monitor for entering or
changing data for example editing digital images.
A touch screen is a screen on which one is able to select actions or commands by touching the screen
with a finger.
A mouse controls the pointer that is displayed on the computer screen.
A joystick is the most popular input device for computer games.
Webcams are cameras that capture images and send them to a computer over the Internet.
A scanner is a device that can read text or illustrations printed on paper and translate the information
into a form the computer can use.
BCR are scanners that interpret vertical zebra stripped marks seen on most manufactured retail
products into digital form before passing them into the computer for processing.
MICRs are used by banks to automatically read those unusual numbers on the bottom of cheques and
deposit slips.
OCR devices read special pre printed characters and convert them in a form which can be understood
by the computer.
Magnetic strips readers are used to read information contained in the magnetic strips on cards.
The keyboard is the most common device used for entering data and commands into a computer.
OMRs are devices that read pencil marks and convert them into computer usable form before entering
them into the computer.
The graphics tablet and stylus are mainly used for computer aided design and drafting by architects,
mapmakers, artists and designers.
Voice recognition systems provide the computer with the capability to distinguish spoken words.
A light pen can make selections, place images, draw and indicate dimensions by simply touching the
screen.
A microphone is an input device that allows a user to speak to a computer to enter data and
instructions into the computer.
MIDI devices can be used to create, record and play back musical compositions
A Sensor and remote sensor is an input device that can detect external changes in an environment

15) Identify the following from the email address: [email protected]

a) i) Domain name yahoo


ii) User name robert
iii) Top level domain name .com

b) i) Which type of organization does the domain name of the email user above subscribe to?
Commercial organization

ii) Give any other example other than the one you have stated above.
Military organization (.mil)
Educational organization (.edu)
Networking organization (.net)
Non governmental organisation (.org)
Government organisation (.gov)

16a) Define the term computer network.


A group or collection of computers connected or linked to each other to share resources and to
communicate.

b) Give three disadvantages of networking computers.

Hardware, software and expertise needed are costly


Vulnerable to security problems since it facilitates easy spread of computer viruses
When the server fails the whole network may also fail

17a) Differentiate between a server and a client computer

A server is a computer that controls resources and responds to requests for resources from other
computers whereas a client is a computer that requests for resources from the server.

b) What is the function of each of the following network devices?


i) Bridge
Used to connect similar networks

ii) Switch
Used to connect network segments and storing the address of every device connected to it

iii) Router
Used to send communication traffic to appropriate network using the fastest available path
18) The table below shows a worksheet which Nabirye was working on. Use it to answer the
questions that follow.

a)i) Suggest a reason why the entry in cell A4 appeared as shown.


The column width is not wide enough

ii) How do you rectify the error in cell A4?


Widen or increase the column width
Autofit
Reduce the font size

b) What does the error in cell E4 mean?


Attempting to divide a number by zero (0) which is mathematically wrong

c) How do you correct the error in cell C5?


Typing the correct function name

19a) Tick the three utility programs from the list below.

TICK HERE
Web browser

Data compressor 

Disk defragmentor 

Operating system

Antivirus software 

b) State the function of any two utility programs you ticked above.

Disk defragmenter
The disk defragmenter utility reorganizes files and unused space on a computer’s hard disk to access
data more quickly and programs to run faster.

Antivirus utility
An antivirus utility is a program that prevents, detects and removes viruses from a computer’s
memory or storage devices.

Data compressors output a smaller file when provided with a stream or file.
20a) Explain the following terms giving an example in each case

i) Simplex
Data transmission in only one direction

Examples
Television broadcast
Radio broadcast
Keyboard transmission
Pagers
Temperature sensors
Door bell

ii) Half duplex


Data transmission in both directions but not at the same time

Examples
Radio call
Fax machines
Credit card verification systems
Automated teller machines
Walkie tokie

b) Identify one non-physical data transmission media.

TICK HERE
Optic fibre

Bluetooth 

Twisted pair

END
UGANDA NATIONAL EXAMINATION BOARD

SUBSIDIARY ICT S850/1

UACE 2016 DRAFT MARKING GUIDE

1. (a) Reasons why mobile phones should not be allowed in secondary school

 Cell phones can be used by students for cheating in exams


 Phones can take away learners concentration during classrooms
 Can cause insecurity in schools
 They are expensive to maintain and service by students
 Increase the rate of immoral behavior through pornography
 Defamation of fellow students or staff
 Increase operational costs of the school e.g power bills
 Can lead to digital divide
 Hacking/cracking can be done
 They can be a source of inappropriate or wrong information

2 (a) Explaining the importance of servicing and maintenance of computers

 To prolong the life span of hardware and software.


 To ensure the proper functioning of the computer.
 To update outdated software programs such as antivirus, Operating System, application
software.
 To increase the efficiency of the computer.
 To increase functionality of the computer.
 To remove faulty hardware and replace with new ones thus preventing system failure

(b) Activities involved in servicing and maintenance of computers.

 Repairing and replacing damaged parts.


 Upgrading software.
 Installing power guards/surge protectors.
 Scanning devices before use
 Disk cleaning
 Emptying recycle bin
 Firewall activation
 Disk defragmentation
 Upgrading software
 Blowing dust off
1
 Installing software and

3 (a) The stating of the file path

Z:\Documents and Settings\All users\Documents\My Videos

(b). Description of method of recovering an accidentally deleted folder from the desktop

 On the keyboard press Ctrl + Z


 Open the recycle bin>Right click on the deleted folder> select Restore
 Run the recovery utility > select deleted folder>select destination>click restore
 Right click on any space on desktop>shortcut menu appears> click undo delete
 Open the recycle bin, then cut and paste on desktop
 Open the recycle bin and drag the file to the desktop

4. Description of ICT terms

(a) System unit: Is an enclosure that contains most of the computer components
Is a casing or box that houses the internal electronic components.

(b) Ram chip: A primary data storage device which allows data to be accessed at a high speed
in any order.
A working memory of a computer which stores data temporarily.

(c) Power supply: A device that supplies the required amount of power to all components of a
computer.
It is a computer hardware that converts AC to DC for computer use

(d) Bus: A communication system/highway/shared flow/path through which


data/information/instructions travels to and from different parts of a computer.

(e) Peripheral devices: Electronic equipment or devices connected from outside the computer
and even if removed the computer continues to work.
Components that are attached or removed to increase computer efficiency.

5 (a) Definition of file extension


This is a suffix or group of letters occurring after the period in the file name indicating the
purpose/ type/ format of the file contents Or
Refers to the last three/four/five characters after a period(.) that make up the entire file name.

(b) Files extensions for the following

(i) Audio file .MP3, .WMA, .WAV, .FLS, .MP4A, .AUX, .AIF, .AUD, .CDA, AU.

2
(ii) Word documents .Doc, .Docx

6 (a) Definition of an output device

A hardware component that allows a user to display/convey/show the progress of result


processing or information.

(b) Categories of printers with examples

(i) Impact printers

Examples Dot matrix, Daisy wheel, drum, braille

(ii) Non-impact printers

Examples Laser jet printer, Deskjet printer, inkjet printer, thermal printer, bubble jet printer

7 (a) Distinction between system software and application software


System software refers to the programs/instructions designed to manage the operation of
computers and avail computer resources to the users while
Application software is a program designed to enable a user to accomplish specific task(s).

(b) Types of language processors

 Interpreters

 Compilers

 Assemblers

8 (a) Differentiate between computer hardware and computer software


Computer hardware is any physical part of a computer that can be touched and seen
While
Computer software is the set of computer programs that provide instructions to computer
hardware.

(b) Listing three categories of computer hardware apart from storage

 Input devices
 Output devices
 Processing devices
 Communication devices

3
9. (a) Public domain software is copyrighted – FALSE

Off-the-shelf software is developed and sold for profit –TRUE

Source codes of open source software programs are only available to paid up subscribers –
FALSE

Shareware programs are widely available from a variety of downloaded sites on the internet –
TRUE

Freeware programs are frequently developed by only amateur programmers – FALSE

10 (a) Definition of a motherboard:


A piece of silicon or semiconducting material onto which integrated circuits or other electric
components are embedded/printed/fixed.
A circuit board found inside the system unit that holds a number of electronic components
attached to the computer.

(b) Identification of components housed on the motherboard.

 Microprocessor
 BIOS chip
 Display adapters
 Built in VGA
 NIC
 AGP and PCI expansion slots
 Buses
 CMOS battery
 Heat sink
 Transistors
 Ports.

11(a) Definition of terms as used in publications

(i) Frame: A feature that enables a user to fit in the required text or image of the required
dimension.
4
(ii)Template: A computer document containing basic information that is used as a model for
writing other documents such as business letters, envelopes, etc.
This is a tool having a pre-formatted design styles that can be used in publication to help a user
easily create basic publication.

(b) Listing desktop publication software

 Adobe illustrator
 Microsoft Office Publisher (Ms Publisher)
 Adobe PageMaker
 Print Master
 PrintShop Professional
 Siera Print Artist
 Coral Draw
 Adobe InDesign
 Serif page plus

(c) Naming a document that can be produced using publication software

 Brochure
 Cards
 Certificates
 Calendars
 Posters
 Flyers
 Banners
 Webpage
 Newsletter

12. Completing the table

Word processing Used to create, edit, format, save and print documents

Spreadsheet Used to organize data in rows and columns and also perform calculations

Database Management System Used to organize data in a way that allows to access,
retrieve and make use of that data. Develop and manage database.

Desktop publishing software Used to design/create publications

5
13. Ways of protecting data and software

 Make backup copies of data regularly


 Minimise the number of vistors in the computer laboratory
 Destroy all the print materials that may not be required
 Install and regularly update antivirus software
 Scan external storage sources with updated antivirus software
 Use power backup/stabliser to avoid system crash
 Activate firewall to restrict unauthoprised access to computer resources
especially on computer networks.
 Use online storage or cyber storage or cloud storage
 Data masking
 Senstising the public about safety data measures
 Burglar proofing of the computer rooms
 Use passwords on computer logins
 Encrypt data
 Use level authentication for sensitive data
 Hide files/folders
 Electronically erase data

14(a).

 Unlikely to be lost
 Faster to arrive
 Allows sending messages to several people at a time
 Cheaper in terms of costs involved
 Messages can be sent at any time anywhere
 Allows sending multimedia format documents
 Less prone to illegal access

6
 Several documents can be sent at once

(b)

 It is good /convenient for sending physical items


 Good for sending legally binding documents
 Convenient for sending bulky/large documents
 It is a cheaper method of sending documents
 It offers a safer delivery of sent documents
 Documents can be tracked while in transit
 There is a possibility of checking the documents before sending during transit or
at the destination for security purposes
 It is a convenient for all categories of people
 It provide employment opportunities to people involved
 It offers infrastructure development in terms of paying taxes

15

(a) Simulation

(b) WIFI

(c) Bluetooth

(d) Virtual reality

(e) Artificial intelligence

16. (a) A hyper link is a built in connection to another related page or part of a webpage which
can be a text or image while
A home page is the starting/index/first page of a website which can act as a list/table of contents
or an index page to the website

16 (b) Netiquette guidelines while using internet

 Keep message brief and use proper grammar and spellings


 Be careful when using sarcasm and humor
 Never read someone’s private mail
 Minimize use of uppercase in text when sending messages
 Post only acceptable information that has no harm to the public
 Avoid impersonation
 Adhere to the same standards of behavior online that you follow in real life

7
 Know where you are in cyber space
 Respect other people’s time and bandwidth
 Make yourself look good online
 Help keep flame wars under control
 Respect other people’s privacy
 Don’t abuse your power
 Be forgiving of other people’s mistakes
 Logout or log off your account after use
 Forward e-mail messages you receive only with permission of the sender.
 Remember you are not anonymous. What you write in an e-mail and web site can
be traced back to you.
 Obey copyright laws. Don't use others' images, content, etc. without permission.
 Use distribution lists appropriately and with permission.
 Do not send SPAM i.e. posting or e-mailing unsolicited e-mail, often advertising
messages, to a wide audience

17 (a) Examples of wireless transmission media

 IRDA (infrared data Association)

 Microwave

 Broadcast Radio or radio waves

 Bluetooth

Disadvantages of wireless transmission media

 Some are not designed for high speed data transfer


 They have a limited range of communication (distance)
 Some devices do not have profiles compatible with devices you want to connect
with
 Susceptible to interference and dilution
 More prone to hackers
 Initial costs of setting up and mantainance are high
 Requires expertise or skilled personnel to configure/administer

18

a) Watermark

b) Mail merge
8
c) Indent

d) Bookmark

e) Cursor

19 a) Communication is the exchange of information between devices. It also refers to the


process of sending and receiving information through a communication channel/path

b) A network is an interconnection of computers and network devices to enable


communication and resource sharing

c) A protocol is a set rules/standards/regulations governing/guiding communication over a


network

d) A modem is a device that translates analog signals to digital signals and from digital to
analog. A combined device for modulation and demodulation

(e) A bandwidth is the amount of data that can be transmitted at a time

 It also refers to the rate of data transmission


 It refers to the range of frequencies in a given transmission medium
 It is a maximum throughput of a transmission medium

20. Benefits of an intranet to an organization

 Facilitates internal emails


 Provides access to company contacts information, procedure manual and other
frequently updated documents
 Used for posting and updating employee forms
 Posting internal job listings
 Provides electronic catalogs for ordering supplies
 Facilitates collaborative computing
 Scheduling meeting and appointments
 Posting financial statements and other types of corporate information
 Maintains shared calendars, projects timelines and other project documents
 Provides access to company databases and other systems
 For monitoring internal security

9
UGANDA NATIONAL EXAMINATIONS BOARD
DRAFT MARKING GUIDE 2017
S850/1 SUB-ICT P.1

1. (a) Tools used to remove dust from a computer.


- Blower
- Sucker
- Wiper / Dry cloth
Any 1 x 1=1mark

(b) Reasons why one would require the following in computer laboratory.
(i) Un-interruptible power supply.
- To give time to the user to save his work by supplying power for a few
minutes after power has gone off / is insufficient / unstable
- To safely turn off/shut down the computer.
- To temporarily supply power to enable the user complete work at hand.
Any 1x2=2 marks
(ii) LCD projector.
- To provide a display/show on wider view to the learners.
- To eliminate the use of chalk which can create dust in the laboratory.
- To minimize the electro-magnetic radiations.
Any 1x2=2 marks
2. (a) The procedure for changing the name of an existing file or folder.
- Select/right click the file/folder.
- Select rename/properties from the drop list.
- Type the new name and press enter/click on the icon to confirm.
OR
- Select the folder/file.
- Press F2 on the keyboard.
- Type the new name and press enter to confirm.
OR
- Open the existing file.
- Select ‘save as’ from the file menu/office button.
- Give the file a new name and press enter to confirm.
OR
- Point at the file/ folder name
- Two single clicks
- Give the file a new name and press enter to confirm.
Any 3x1=3 marks
(b) Function of the device driver in a computer system
- They enable computer components communicate.
- They act as an interface between peripheral devices and the computer.
Any 1x2=2 marks

Page | 1
3. Write the following in full.
a) CCTV: Closed Circuit Television
b) ROM: Read Only Memory
c) CAD: Computer Aided Design
d) CPU: Central Processing Unit
e) VDU: Visual Display Unit / Video Display Device
Any 5x1=5 marks
4. (a) Storage devices resistant to virus attacks.
- CD-R
- CD-ROM
- DVD-R
- Blue ray
- DVD-ROM
Any 1x1=1 mark
(b) Describing the following terms as used in computers.
(i) File: A block/collection of related data/information with a name.
2 marks
(ii) Folder: It is a virtual container for files and sub-folders. 2 marks
5. (a) Categories of the components of a computer system.
- Hardware.
- Data
- Software.
- User
- Procedure Any 4x1=4 marks
(b) Function of any one category you have stated in 5 (a).
 Hardware can be used for:
- Input of data.
- Output of data.
- Storage of data.
- Processing of data.
- Communication.
 Data:
It acts as a raw material for information.
 Software:
- Controls/manages the operations of the resources.
- Provides the user interface.
- Guides computer operations.
- Provides security on data.
- Computer error management.
 User:
- To instruct the computer system.
- To program the computer system. Any 1x1=1 marks
Page | 2
6. Indicating TRUE or FALSE
(a) FALSE
(b) TRUE
(c) FALSE
(d) FALSE
(e) TRUE
Each 1 mark=5 marks
7. (a) Definition of hardware.
Refers to the physical/tangible component of the computer.
2 marks
(b) Ports used to connect devices on a computer.
- Ethernet port. - SD port
- Ps/2 port - MIDI port
- USB port - Fire wire/1394 port
- Parallel port - Audio ports
- Serial port - SCSI Port
- HDMI port
- VGA port
Any 2x1=2 marks
(c) Devices used to transfer a hardcopy document to a computer.
- Scanner
- Digital camera
- Fax machine (facsimile)
- Smart phone
Any 1x1=1 mark
8. (a) Definition of system software.
System software is a set of programs designed to manage operations of the
computer and avail computer resources to the user
1 mark
(b) Functions of an operating system.
- Allocating system resources.
- Provides user interface.
- Offers data and software security.
- Scheduling computer jobs/tasks.
- Managing computer memory.
- Monitoring system performance.
- Provides platforms for applications to run.
- Establishing network connections.
- Managing booting processes.
- Device management.
Any 4x1=4 marks

Page | 3
9. (a) Distinguishing reading and writing
Reading is a process of transferring data/instructions and information from a
storage medium into memory
While
Writing is a process of transferring data/information from memory to a storage
medium.
For both sides correct. 2 marks
(b) Example for each of the types of storage devices given below.
(i) Optical storage: CD-R, CD-ROM, CD-RW, DVD-R, DVD-ROM, DVD-
RW, Blue Ray
(ii) Magnetic Storage: Hard disk, Floppy disk, Magnetic tape, Zip disk, Jazz
disk.
(iii) Solid State: Memory card, Flash disk
Any 3x1=3 marks
10. (a) Examples of documents created using desktop publishing application.
- Calendar - Adverts - Magazines
- Cards - Newsletter - Posters
- Invoice - Fliers - Web pages
- Brochures - Certificates - Signs
- Label - Book covers - Menu

Any 2x1=2 marks


(b) Desktop publishing features that can enhance the documents.
- Templates. - Borders
- Color separation - Font color
- Frames - Font faces
- Graphical objects - Font styles
- Text boxes - Alignment

Any 3x1=3 marks


11. (a) Threats that system administrators may face as a result of networking
computers.
- Eavesdropping / lack of privacy - Spamming
- Data fabrication/modification - Plagiarism
- Data theft - Taping
- Pharming - Sniffing
- Phishing - Spoofing
- Hacking - Vishing
- Virus attack Any 3x1=3 marks
- Cracking

Page | 4
(b) Measures employed to reduce the network threats.
- Use passwords.
- User account authentication
- User access control levels
- Use anti spyware
- Use antivirus
- Data encryption
- Use firewalls
- Use biometric authentication.
- Use possessed objects e.g electronic cards
Any 2x1=2 marks
12. (a) Naming elements of data communication.
A. Sender/sending device
B. Communication channel/path or transmission medium
C. Receiver/receiving device
Any 3x1=3 marks
(b) Device used to connect A to B
- NIC (Network Interface Card)
- USB card
1 mark
(c) Protocol used to uniquely identify A and C
Internet protocol
1 mark
13. Indicate INPUT or OUTPUT
(A) INPUT
(B) OUTPUT
(C) OUTPUT
(D) INPUT
(E) OUTPUT
Each 1 mark=5 marks
14. (a) Reasons for using electronic application in budget preparation.
- The inbuilt mathematical formula and functions provide quick manipulation of data.
- It has automatic recalculation features.
- It has grid lines therefore no need to draw tables.
- The what if analysis enables predictions and projections to be made faster.
- It provides a variety of graphical representations of data for better analysis.
Any 2x1=2 marks
(b) Use of the following applications;
(i) Presentation software:
- For creating slides to enhance speech.
- Used for making animated graphics for adverts.
- Creating handouts.
Any 1x1=1 mark

Page | 5
(ii) Word processor:
- Used to create letters.
- Used to create memos.
- Used to create a document and send it to multiple people.
- Used to create CVs.
- Used to create reports.
Any 1x1=1 mark
(ii) Communication software:
- It is used to exchange information electronically.
- It is used to create an electronic message.
- It facilitates management of stored E-mails.
Any 1x1=1 mark
15. (a) Example of a presentation software.
- MS PowerPoint
- Lotus Freelance graphics.
- OpenOffice Impress
- Corel presentation
- K-presenter
- Screencast
- Google slides
Any 1x1=1 mark
(b) Importance of the following features;
(i) Master slide:
- It is used to determine the appearance of all slides in a presentation in terms of
format.
2 marks
(ii) Transitions:
- Determine how slides appear/enter and disappear/exit on screen in a presentation.
OR
- Adds animation effects on slides as they appear/enter and disappear/exit on screen during
presentation.
Any 1x2=2 marks
16. (a) Advantages of using E-mail services over sending mail by post.
- Faster delivery of information by E-mail.
- E-mails services are cheaper in term of delivering Information.
- E-mails are more secure since can be protected by passwords.
- E-mails offers immediate feedback to the sender.
- A single E-mail can be sent to multiple recipients at the same cost.
- A single E-mail can be sent to multiple recipients at the same time.
- E-mail is less susceptible/prone to loss.
- E-mail services facilitate management of stored mails.
- E-mail can be sent anywhere at any time as long as there is active network.
Any 3x1=3 marks

Page | 6
(b) Advantages of post-mail services over e-mail communication.
- There are lower chances of eavesdropping with post-mail service.
- Legal documents with original signatures can be sent using post-mail service.
- Physical messages can be sent by post.
- No loss of mail due to virus attack.
- Documents can be tracked during transit.
- Possibility of checking documents before sending, during transit or the
destination for security.
- It is convenient for all categories of people.
Any 2x1=2 marks
17. Examples of networking devices.
- Network Interface Card (NIC)/Network Adaptor
- Modem
- Hub
- Switch
- Router
- Wireless Access Point (WAP)
- Repeater
- Bridge
- Multiplexer
- De multiplexer
- Concentrator/terminator
Any 5x1=5 marks
18. Ways in which students use internet.
- Communication through e-mails, voice over IP, on-line chat, telephony
- Online education through virtual classes,
- Online discussion, forums
- Online research trough Online library/learning materials like text books
- Access to simulated experiments/behaviors.
- Web-based training/assessment.
- Virtual storage/online storage.
- Online collaboration
Any 5x1=5 marks
19. (a) (i) Definition of data transmission media.
- It is a path through which data signals are transferred/conveyed from one point to another.
1 mark
(ii) Examples of transmission media.
- Micro waves - X-rays
- Radio waves - Coaxial cables.
- Infrared rays - Twisted pair cables
- Gama rays. - Fiber optic cable
Any 2x1=2 marks

Page | 7
(b) Services offered by data communication tools.
- E-mails
- News groups
- Chat rooms
- Video conferencing.
- Telecommunication/teleconferencing.
- Instant massaging.
- Telemedicine
- E-learning
- E-commerce

Any 2x1=2 marks


20. (a) Services using E-payment method.
- Banking
- Education
- Health / medical services
- Transport
- Online trade
- Insurance
- Civil service
- Entertainment
- Revenue collection
- Communication
- Utility
Any 2x1=2 marks
(b) Advantages of using E-payment over traditional methods.
- Quick delivery of money.
- Transaction can be done at any time.
- It is more secure since there is no physical handling of money.
- It is efficient in terms of cost and time.
- Reduced counterfaite
Any 3x1=3 marks

End

Page | 8
1a) List three major specifications one would consider when buying a laptop computer.

Processor speed/power/model/type
Amount of memory installed (RAM)
Hard disk space/amount of storage space
Ability to communicate with other peripheral hardware
VGA capacity
Screen specifications-resolution
resolution and size
Batter life span
Compatibility with software-operating
operating systems
Laptop size

b) Illustrate the information processing cycle.

Input Process Output Storage

2a) Distinguish between cold booting and warm booting

 Cold booting refers to starting a computer that had been powered off completely whereas warm booting
refers to restarting a computer that is already powered on or running.

b) Give three circumstances under which a computer can be warm booted.

 When the computer freezes-memory


memory is full
 When the computer freezes-memory
memory is hangs (does not respond)-CPU
CPU overheated
 After installation of a new software (application or utility)
 When a peripheral orr hardware component has failed to function/work
 During/After installation of operating system.
 After changing use control settings(CMOS/BIOS settings)/computer
settings)/computer configurations
 When a user wants to clear a malicious infection like malware, spyware, viruses that are in memory
 When a user wishes to switch from one operating system to another (Multiple O.S)
 After software update  After malware/virus scanning
 After software upgrade  When a deadlock occurs
 After uninstalling software  Before Installing software
 After uninstalling hardware  When application software fails to work
 After installing a new hardware  When power voltage suddenly lowers
 When the computer system slows down  To activate a boot scan
 When there is suspected system tapping  After performing a system restore
 During troubleshooting

3a) What is information and communication technology (ICT)?

 A collection of related technological tools used to create, store, manage and disseminate information.

b) Outline any three measures that can be taken to prevent environmental degradation through the use of
ICT.

 Minimize the use of paper by using the internet to send e-mails than physical letters
 Through properly recycling, disposing off of e-waste.
 Sensitize people about environmental management through social media platforms
 Through use of Google maps to spot areas where degradation has occurred so as to mitigate the effect
 Through use of television talk shows to sensitize people about environmental management
 Through use of radio announcements to disseminate information about environmental management
 Through use of pop-up messages sent to phone to alert or remind people about environmental
management
 Through use of drone to plant trees, spay, irrigate, put off fire in hard to reach areas
 Through use of grid computing
 Through use of virtualization of computing hardware
 Through use of low power hardware like LCD monitors and laptops
 Through use of cloud computing
 Through developing bio-degradable computing devices
 Switch off hardware when not in use

4a) Give two reasons why file management is important in a computer system

 To improve file security through passwords and file conversions


 To free up storage space for more files through file compressions
 For quick transfer of files
 To quickly access files through grouping files and naming files

b) List three operations which can be performed on a file

 Creating a file  Zip or compress a file


 Opening a file  Sorting files
 Updating a file  Combine/split a file
 Deleting a file  Encrypt a file
 Closing a file editing a file  Backup a file
 Sending a file  Restore a file to a previous version
 Converting a file  Share a file
 Printing a file  Scan a file
 Saving a file  Hide a file
 Drag a file: method of moving a file from one location to another on the screen by use of a mouse.
 Creating a duplicate of a file
 Move/cut a file: transferring a file form one location to another
5a) Explain the term troubleshooting as used in computers

 Troubleshooting is a process of identifying and solving/fixing a computer problem

b) State three ways in which one can troubleshoot a computer that has failed to start

 Remove/replace/re-fix properly hardware like keyboard, mouse, display device, RAM chips, bus
connections
 Start the computer from an external startup disk
 Repair the operating system
 Remove any external storage media like flash disks at start-up
 Ensure the power connections are properly fixed
 Ensure the computer is connected to required power voltage amount
 Restart the computer to correct any software problems before it completes the boot process.
 Run properly recommended system settings

6a) Define an input device

 An input device is a device used to feed/enter data and instructions into a computer.

b) Name two basic input devices associated with common desktop computers

 Mouse
 Keyboard

c) Identify an input device for each of the following data


Sound-Microphone
Images-Camera/Camcorder/Scanner

7a) Outline any three functions of an operating system

 Allocating system resources  Memory management


 Offering data and software security  Configuring devices
 Monitoring system performance  Providing the user interface
 Establishing network connections  Spooling print jobs
 Providing a platform for applications to run  Managing storage and storage media
 Booting the computer  Error management

b) Name any two operating system software


 Disk operating system  Solaris
 Windows operating system  Google operating system
 UNIX  Android
 LINUX

8) Ali has a DVD full of data and would like to transfer the data to CDs. The capacity of the DVD is
4.7GB and each CD is 700MB. Calculate the number of CDs he would need to transfer all his data.

 1 GB =1073741824
 1MB =1048576
 4.7GB =4.7*1073741824 5046586573
 700MB =700*1048576 734003200
 5046586573/734003200 = 6.875428571
 7 CDs would be needed to store 4.7GB of data
9a) Define the term tailor-made software

 Tailor-made software is software designed at a user’s request in order to meet the user’s particular
needs

b) Outline any four qualities of good application software

 Should be error free-operate without bugs  Should be capable of displaying error


 Should provide help incase of user errors messages to the users
 Should be flexible  Should be scalable-easy to change to meet
 Should be compatible or machine user needs
independent  Should be interoperable-work with other
 Should not stop working no matter the software
errors made by the user-robust  Should be accurate in retrieving results
 Should be easy to use  Should be portable-work on multiple
 Should be easy to learn operating systems
 Should be easy to update/upgrade  Should be efficient
 Should have user manuals and  Should be readily available
documentation  Should be authentic/genuine/licensed
 Should be reliable

10a) Write the following computer abbreviations in full

CPU
 Central processing unit

ALU
 Arithmetic logic unit  Arithmetic and logic unit

b) State the role of each of the following CPU components

Bus
 Carries data and instruction between different computing components

Control unit

 Manages the activities in the CPU  Decodes instructions


 Fetches instructions  Executes instructions

Registers

 Temporarily hold data and instructions needed by the CPU


 Helps the CPU to access data and instructions quickly

11a) Distinguish between utilities and application software

 Utilities are service programs that enhance the computer system operations whereas application
software refers to software designed to meet the needs of the user.

b) Give three examples of utility programs


 File viewer  Backup utility
 File compression utility  Copying utility
 Screen saver  Merging utility
 Diagnostic utility  Debuggers
 Antivirus utility  Disk partitioners
 Uninstaller  Disk cleaner
 Sorting utility  Memory testers
 Disk scanner  Anti spy utility
 Disk defragmenter  Delete utility
 Software monitors  Network utility

12) Explain the following as applied to Internet

Hotspot

 A location where an internet connection can be accessed wirelessly


 A specific location that provides a data link or connection on a wireless network.

Internet service provider

 An ISP is a company that provides Internet connections to individuals and other companies.

Search engine

 A program used to find web contents using keywords or leading statements on the World Wide Web.

13) Give five symptoms of a computer infected by a virus


 Changes to disk volume identification  Pop up of scary /warning messages
 Executable files changing size for no  Denial of access to some system tools
obvious reasons.  The computer shut down and restarts
 Programs/files mysteriously disappearing without any command from user.
 Access lights turning on for non referenced  Unexpected anti-virus disabling
devices  Change of keyboard stroke
 Less memory available than usual  Corrupting of files
 Unusual error messages occurring more  Duplication of files
frequently  Creation of file shortcuts
 Disk accesses seeming excessive for simple  System properties fluctuate
tasks  Uncalled for musical or sounds appearing
 Programs taking longer than usual to load randomly
 Unfamiliar graphics or quizzical messages  Booting failure
appearing on the screen  Deletion of files
 Failure to do print jobs  Alteration of file names
 Computers may not start at all  Screen blackout
 Computers may freeze or hang

14a) Give two reasons to justify ownership of institutional websites

 To have copyright over the site


 To have patent rights over products on the site
 To have the right to sell products online
 To have a right to post information online
 To have a right to advertise goods and services
 To have a right to edit and format the content on the site
 When the company has online interaction with the public
 To welcome criticism or feedback from the public
 To encourage pride of ownership
 To advertise the business
 To sell products online
b) What is a web browser?

 Software used to navigate content on websites

c) Under what circumstances can someone use a uniform resource locator (URL) in web browser?

 When a person wants to access a specific resource directly on the internet


 Incase a person knows a particular link of a given site or webpage
 Incase a person wants to quickly access a particular site/page/resource
 Incase a search engine fails to locate the site link

15) Give any five advantages of using automation in an industry

 Increased productivity
 Improved remote access to materials in hazardous areas
 Improved monitoring or supervision of industrial activities
 Efficient handling of repetitive tasks
 Reduced production time making goods available on market in a short time
 Reduced accidents
 Reduction in cost of production-no need to pay workers
 Improved quality of products and range of products
 Efficient utilization of raw materials leading to reduction in operational costs

16a) Define data communication

 Data communication refers to transferring data, instructions and information to another computer or
some other devices over a channel.

b) State any four requirements for setting up a computer network

 Network interface cards  Wireless access points


 Router  Bridges
 Repeater  Network software
 Hubs/Switches  RJ45 connectors
 Ethernet cables/ Transmission media  Qualified/skilled personnel in networking
 Modem  Crimping tool/terminator
 Computers

17. For questions a)-e), fill in the missing words from the list below.

Formula bar Worksheet Active cell Workbook


Cell Column Name box

a) The Cell is the intersection of a column and a row


b) The content of a current cell is also displayed in the formula bar
c) The active cell is one with a thicker boundary and is the insertion point in a spreadsheet
d) The cell address of the current cell is displayed in the name box
e) A spreadsheet file is referred to as workbook

18a) Give three disadvantages of electronic communication

 Associated with unreliable networks


 Prolonged use of electronic gadgets leads to health problems like eye strain, backache, neck ache,
headache, stress, wrist pain and body fatigue
 Associated with quick and widespread computer malware/viruses
 Change in technology-obsolescence
 Facilitates cyber terrorism and defamation

b) Name any two manual communication methods

 Ringing a bell or using a bell


 Drumming or using a drum
 Word of mouth or by a messenger
 Using gestures/signs/posture
 Postage or ordinary mailing
 Whistling or using whistles
 Making an alarm or ululation
 Use of fire throws/fireworks/smoke

19a) Give two situations under which electronic presentations would be used

 During teaching
 When presenting or addressing a big audience
 During advertisements

b) State three advantages of using electronic presentations over traditional chalk and talk

 An electronic presentation can be save for future reference compared to traditional chalk and talk
 Makes the presentation more interesting due to use of multimedia like animations and transitions
 Visual explanations/illustrations are more clear
 An electronic presentation is more systematic and precise

20a) Differentiate between intranet and extranet

 An intranet is a network that allows sharing of resources only among members within an organization
whereas an extranet is a network that extends resources to authorized members outside the organization
related to that organization.

b) Define a local area network (LAN)

 A LAN is a network that spans a limited/small geographical area like a building or room.

c) Suggest an area network which is restricted to connecting users in a city.

 Metropolitan area network (MAN)


S850/2
Subsidiary ICT
(PRACTICAL)
Paper 2
Nov./Dec.2013
2 hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
(PRACTICAL)
Paper 2
2 hours

INSTRUCTIONS TO CANDIDATES:

This paper is made up of five equally weighted questions.

Answer any three questions.

Any additional question(s) will not be marked

Each candidate is provided with a new blank Compact Disc (CD).

Candidates should continuous save your work.

Each candidate must produce a hard copy for each of their to accompany the
Compact Disc (CD

© 2013 Uganda National Examinations Board Turn Over


1. (a) Use a word processor of your choice, produce the document below as
it appears. (06 marks)

ICT AS A TOOL FOR TEACHING AND LEARNING

T
he term ICT is stands for Information and Communication
Technology and is defined as a “Diverse set of technological tools
and resources used to communicate, and to create, disseminate, store,
and manage information”. ICT has become a very important part of
the educational delivery and management processes. ICT largely facilitated the
acquisition and absorption of knowledge and hence providing extraordinary
opportunities to developing countries for enhancing their educational systems
particularly for the under privileged constituency, and thereby raising the level
of quality of life for their people.

(b) Copy the document to another page. (01 mark)


(c) Double space the text in the document. (01 mark)
(d) Italicize and bold the word ICT throughout the document. (01 mark)
(e) Use “Times New Roman” font face and font size, “12” for the entire
document. (01 mark)
(f) Insert your name and personal number as footer and header respectively.
Centre align them. (03 marks)
(g) Use mail merge feature to post the document above to the recipients
below. (05 marks)
NAME ADDRESS COUNTRY
MS AKIIRO GRACE P.O BOX 23 KAMPALA UGANDA

MR.ASSIMWE ANDREW P.O BOX 19 NAIROBI KENYA

(h) Save your work as your name and personal number. (01 mark)

(i) Print all your work. (01 mark)

1
2. (a) A school produced an end of term one mark list for senior five; using
any spreadsheet program enter the data in the table below. (04 marks)

(b) Provide a heading for your worksheet as “Kitti Secondary School, Results
for 2012” and center it with font size 24.5. (03 marks)

(c) Using appropriate functions determine for each student the

(i) Total mark. (01 mark)

(ii) Average mark. (01 mark)

(iii) Position. (02 marks)

(d) Apply boarders on the data you have entered in the worksheet. (01 mark)

(e) Insert your name and personal number as footer. (01 mark)

(f) The sheet for the table should be named as Table. (01 mark)

(g) Create a pie chart using the average marks, and include:
(i) The Heading “Senior Five term one marks, Kitti Secondary School”
(01 mark)
(ii) Labels with the chart. (01 mark)

(h) Copy the chart to sheet 2 and name it Chart. (02 marks)

(i) Save your work as your name and personal number. (01 mark)

(j) Print your work. (01 mark)

2 Turn Over
3. Use any desktop publishing software to design a certificate of excellence
for Kiryamenvu Senior Secondary Senior Six (S.6) candidates who
have excelled in the following application packages: Ms Word, Ms
Excel, Ms PowerPoint, Ms Access and Ms Publisher. Provide space for
signatures of the head teacher and head of ICT department. (10 marks)
(a) Adjust the paper size to a width of 11 inches and height of 8.5 inches.
(02 marks)
(b) Insert clip art to represent the owners photograph. (02 marks)
(c) Use your name as the owner of the certificate. (02 marks)
(d) Use your name and personal number in the footer. (02 marks)
(e) Save and print your publication. (02 marks)

4. In a learner centred approach, a teacher uses some learners to pass on


knowledge to their fellow learners. It makes learning fun as learners get to
learn from one another. Senior six (S.6) learners can pass on knowledge to
senior two (S.2) learners and vice versa.
Study the information and perform the tasks below.
Categories of Computer Devices
Computer devices are sub divided into four categories as follows:
 Input devices
 Output devices
 Processing devices
 Storage devices

Input devices:-These are any hardware components used to enter data and
instructions into a computer system. E.g .Keyboard

Output devices:- These are any hardware components used to display or


convey information or data to a user. E.g monitor

Processing devices:- This is used to manipulate data into information.


Processing is usually done in the Central Processing Unit (CPU).

Storage devices:- These are used to record and retrieve data to and from a
storage medium in the computer system. They can be either internal like the
3
HDD, or external like a CD. Storage devices have got their specialized drives
through which data can be written or read. For example, data on a CD can be
read with the help of a CD or DVD drive.

Conclusion:

Whereas the above devices are standard input-output devices, some other
devices are referred to as computer peripherals. Computer peripherals are any
electronic devices that can be hooked to a computer. Examples of peripherals
include speakers, microphone, printers, scanners and digital cameras.

Tasks

(a) As a senior six Subsidiary ICT student prepare a four slide presentation
for the S.2 learners summarizing the information given above.
(08 marks)
(b) Save the presentation with your name. (01 mark)
(c) Insert a header as your name and personal number. (01 mark)
(d) Change the background of all slide titles to an appropriate style.
(01 mark)
(e) Set the slide transition of your choice, with transition time of 6 seconds.
(02 marks)
(f) Set animations of your choice for all slide titles and other parts of the
slides. (01 mark)
(g) Make use of speaker’s notes and relevant graphics. (02 marks)
(h) Insert a summary tabular slide between the last slide and second last
slide with the following data. (03 marks)
Summary table:
NO DEVICE HARDWARE CATEGORY
1 Keyboard &Mouse Standard Input device
2 Monitor Output device
3 CPU Processing device
4 Hard Disk Storage
5 Speakers, Microphones, printers, scanners, peripherals
and digital cameras

(i) Save and print your work. (01 mark)

4
Turn Over
5. The table below shows medical records of a certain clinic

PID Fname District DoB Diagnosis Treatment fee


P02 Omondi Busia 3/2/1996 Malaria 10000
P04 Katiba Kampala 6/9/1997 Typhoid 100000
P05 Waiswa Busia 3/5/1981 Tuberculosis 20000
P06 Nambi Busia 2/8/1989 Dysentery 120000
P09 Lumu Kampala 4/5/1990 Malaria 30000
P11 Nafula Busia 5/11/1989 Tuberculosis 20000
P15 Waiswa Jinja 10/11/1978 Malaria 60000

(a) Create a database called Medical Details. (01 mark)


(b) Design a table with appropriate data types in design view called
Patients. (04 marks)
(c) Enter the given data in the table. (02 marks)
(d) Create a query to display all the details of patients who come from either
Jinja or Busia. Save it as Eastern Patients. (02 marks)
(e) Create a query to display all the details who were not diagnosed with
Malaria. Save it as No Malaria. (02 marks)
(f) If the Government pays 40% of treatment fee for all patients, create a
query to calculate discounted fee. Put only Fname, DoB, Diagnosis and
Treatment Fee on the display. Save it as Discounted fee. (03 marks)
(g) Create a report to display the information in the discounted fee query.
(03 marks)
(h) Create a form from discounted fee query showing all details and save it
as Patient’s form. (02 marks)
(i) Print your work. (01 mark)

END

5
S850/3
Subsidiary ICT
(PRACTICAL)
Paper 3
Nov./Dec.2013
2 hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
(PRACTICAL)
Paper 3
2 hours

INSTRUCTIONS TO CANDIDATES:

This paper is made up of five equally weighted questions.

Answer any three questions.

Any additional question(s) will not be marked

Each candidate is provided with a new blank Compact Disc (CD).

Candidates should continuous save your work.

Each candidate must produce a hard copy for each of their to accompany the
Compact Disc (CD

© 2013 Uganda National Examinations Board Turn Over


Attempt any three questions in this paper

1. (a) Open a word processing software and type the document below as it
is. Save it as Sub-ICT. (07 marks)

SUBSIDIARY INFORMATION AND


COMMUNICATION TECHNOLOGY TEACHING
SYLLABUS

Introduction
This syllabus was developed after looking at the need for Information and
Communication Technology (ICT) knowledge and skills among learners and
how these help to improve on the teaching-learning process. The education
sector and the world of work require an individual to possess ICT knowledge
and skills. This is evidenced by the demand for computer literacy and computer
skills for respective job vacancies being advertised today.

This syllabus has been prepared to help the learner acquire ICT knowledge and
skills required to meet the challenges of ICT applications in society. The
syllabus emphasizes use of practical examples whenever possible to teach ICT
applications which the world of work expects a high school graduate to possess.

The subsidiary ICT syllabus is meant to help the learner acquire skills required
by end users of ICTs and which can be applied in a variety of fields.

[Source: NCDC Teaching Syllabi for Subsidiary Mathematics and Subsidiary


Information and Communication Technology. Page 88, Volume 10, 2013]

(b) Make a copy of the document to page two. (01 mark)

(c) Insert an appropriate clip art in your document. (02 marks)

(d) Make the first letter of paragraph 2 a Drop cap of three lines. (02 marks)

(e) Insert a footnote “we are ready to move with ICT” on the word ICT
paragraph 1. (02 marks)

(f) Insert a watermark as Educational Transformation. (02 marks)

(g) Insert the current date and right align it. (02 marks)

(h) Insert your name and personal number as header. (01 mark)

(i) Save and print your work. (01 mark)

1
2. In this question, you are going to be working with a template developed
by a certain canteen manager of your school.
Study the template and the additional information given below.

ITEM COST VAT PROFIT ITEM ITEM


PRICE TAX EXPENSES PRICE
MACARON 50000
RICE 60000
BREAD 80000
BOOKS 24000
PENS 12000
SUGAR 30000
DOUGHNUTS 10000
JUICE 12500
SAMOSAS 8000
TOTAL

 VAT TAX IS 18% OF THE ITEM PRICE.


 PROFIT IS 20% OF THE ITEM PRICE.
 ITEM EXPENSES ARE CALCULATED AT HAFT OF THE ITEM
PRICE.
 ITEM PRICE IS EQUIVALENT TO COST PRICE PLUS VAT, PLUS
ITEM EXPENSES, PLUS PROFIT.

NOTE: Use function for parts (b) to (e)

(a) Enter the above template in a spreadsheet application of your choice.

Save it as Canteen Template. (04 marks)

(b) Determine the canteen VAT TAX, PROFIT, and ITEM EXPENSES for

each item. (03 marks)

(c) Determine the COST PRICE for each item. (01 mark)

(d) Determine the total amount for each column. (01 mark)

(e) Assuming the budget was read dropped the item prices by 10%;
(02 marks)

2 Turn Over
(i) Insert a column NEW ITEM PRICE at the end of the table
(ii) Determine the new item price for each item.

(f) Let your figures be formatted to UGX currency symbol. (02 marks)

(g) Represent the ITEMS, ITEM PRICES, and NEW ITEM PRICES on an

appropriate line chart. (04 marks)

(h) Insert a centred header of your name and personal number in the
worksheet. (01 mark)
(i) Name your worksheet as Income Statement. (01 mark)

(j) Print your work. (01 mark)

3
3. (a) Using any publication software, design a business card using details
below. (05 marks)

COMPANY NAME: EUNIBERT INTERNATIONAL LTD


P.O BOX 9298 KAMPALA
TEL: 07740775582
+2547089179
TITLE: MANAGER
CARD OWNER: Use your name
DEALERS IN: STATIONERY, COMPUTERS
EMAIL: Use your email address.
(b) Adjust the orientation to portrait. (02 marks)
(c) Insert a logo of three letters. (02 marks)
(d) Insert a clip art behind the text. (02 marks)
(e) Apply a word art to your company name. (02 marks)
(f) Apply font color, font styles and design. (03 marks)
(g) Make six identical cards per page in your publication. (03 marks)
(h) Save your work as Business Cards. (01 mark)
(i) Print your work. (01 mark)

4
Turn Over
4. You have been to sensitize the public about the introduction of Subsidiary
ICT at A-level.

(a) Use presentation software to deliver your presentation with the following
content:

(i) Slide 1: A presentation title in word art format and you as the presenter.
(02 marks)

(ii) Slide 2: An introduction about the subject. (02 marks)

(iii) Slide 3: Use bullets to outline the reasons for studying the subject.
(03 marks)

(iv) Slide 4: Present the table below: (04 marks)

MY SENIOR FIVE SUBSIDIARY ICT RESULTS


TERM MARK SCORED COMMENT
ONE 76 GOOD WORK
TWO 83 VERY GOOD
THREE 79 GOOD WORK

(v) Slide 5: Present the first two columns of the table above on a column with a
slide title. A GRAPH REPRESENTING MY SENIOR FIVE ICT MARKS.
(04 marks)

(b) Use relevant images and colors to enhance your presentation. (01 mark)

(c) Add a header and footer as your name and personal number respectively.
(02 marks)

(d) Print all your slides on one page. (01 mark)

(e) Save your presentation as your name and personal number respectively.
(01 mark)

5
5. The table below represents Kagali Secondary School student’s data.

STUDENT NAME SEX AGE CLASS HOME


NUMBER DISTRICT
K0067 Babirye F 18 S.5 Iganga
K0078 Najjuka F 19 S.3 Masaka
K0045 Aronda M 20 S.4 Mbale
K0043 Nassuna F 25 S.6 Arua
K0140 Sempa M 17 S.2 Mityana
K0134 Mulira M 45 S.6 Zirobwe

(a) Create a database and save it as Kagali database. (01 mark)


(b) Create a table to capture the given information with appropriate data
types. (03 marks)
(c) Enter the data in the table below. (02 marks)
(d) Generate a form to return the records of the following fields: STUDENT
NUMBER, NAME, AGE and HOME DISTRICT. Save it as Student’s Form.
(02 marks)
(e) In the form,
(i) Insert any clip art picture from the library to appears as the logo. (02 marks)
(ii) Include the title as KAGALI SECONDARY SCHOOL with font size 20.
(02 marks)
(iii) Indicate the date and time it has been created. (01 mark)
(f) Use a query to filter out student(s);
(i) from Masaka district. Save it as Masaka. (01 mark)
(ii) with age above 18. Save it as Age. (02 marks)
(g) Generate a report from the table. Save it as Student’s report. (02 marks)
(h) Add your name and personal number as footer on your report. (01 mark)
(i) Print your work. (01 mark)

END
6
S850/2
Subsidiary ICT
(PRACTICAL)
Paper 2
Nov./Dec.2014
2 hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
(PRACTICAL)
Paper 2
2 hours

INSTRUCTIONS TO CANDIDATES:

This paper is made up of five equally weighted questions.

Answer any three questions.

Any additional question(s) will not be marked

Each candidate is provided with a new blank Compact Disc (CD).

Candidates should continuous save your work.

Each candidate must produce a hard copy for each of their to accompany the
Compact Disc (CD

© 2014 Uganda National Examinations Board Turn Over


Attempt any three questions in this paper

1. (a) Using a word processor of your choice, type the document below
using Comic Sans Ms font style. Save it as Reading Lesson 1.
(05 marks)
Jack is a young lad living with his widowed mother. Their only means of income is
a cow. When this cow stops giving one morning, Jack sent to the market to sell
it. On the way to the market he meets an old man who offers to give him “magic”
beans in exchange for the cow.
Jack takes the beans but when he arrives home without any money, his mother
becomes angry and throws the beans to the ground and sends Jack to bed
without supper.
(b) Copy all the text and past it in a new blank document. Save it as Reading
Lesson 2. (01 mark)
(c) Include heading JACK& THE BEAN STALK and format it to size 28.
(02 marks)
(d) Change the spacing for all paragraphs of text to 1.5. (01 mark)
(e) Insert an auto shape of a face in the middle of paragraph 1. (01 mark)
 Wrap text around it Tight. (01 mark)
 Resize it to height of 0.47 inches and width of 0.68inches. (01 mark)

(f) Insert a page break below the last paragraph. (01 mark)

(g) On page 2, use a table of 7 rows and 3 columns to design your class time
table. (02 marks)

(h) Modify the table in (g) and make it appear like the one below. (03 marks)

Timetable for Reading lessons


CLASS 2 CLASS 3
Mon
Tue
Wed
Thur
Fri
KEY:

Teacher Agnes Teacher Helen

(i) Insert a header of your name and personal number. (01 mark)

(j) Save and print all your work. (01 mark)

1
2. There will be a “Science and Technology Exhibition” in your school on 15th
May next year. The ICT club has been chosen by the school administration to
organize a team and suitable materials which will market the school at this
exhibition. You have been selected to head this team.

(a) Using presentation software of your choice, design a 4-slide presentation


which you and your team will use to market your school on this day.

(i) Slide One:

 A title slide outlining basic information about your school. (02 marks)

(ii) Slide Two:

 Use an appropriate slide title. (01 mark)


 Use an organizational chart slide layout to organize the information
below in the most appropriate way. (04 marks)
 Top in the hierarchy of your computer club executive members is the
PATRON [MR.KABAALE]
 The Club CHAIRPERSON[GATUSO] followed by VICE
CHAIRPERSON[ANNET]
 The CLUB SECRETARY(AISU), the PUBLICITY
SECRETARY[ONEN] and CLUB TREASURER [ATUGONZA]

(iii) Slide Three:

 Use a title and table slide layout. (01 mark)


 In the table on this slide, organize the following subjects taught in the
school under the different levels. Insert a suitable title for this table.
(03 marks)

2 Turn Over
LEVEL SUBJECTS
O-LEVEL Computer Studies, CRE, English, History, Biology, Physics,
Chemistry, Fine Art, IRE, Luganda, and Political Education.
A-LEVEL Science subjects[Chemistry, Biology, Physics, Mathematics,
Agriculture, and General Paper/Sub-ICT/Sub-Mathematics]
Arts subjects [History, Geography, CRE, IRE, Luganda, and
General Paper/Sub-ICT/Sub Mathematics]

(iv) Slide Four:

 Use the title The ICT Club Members from 2008-2010 and a chart slide
layout. (02 marks)
 The table below shows enrollment figures for the O-level ICT members
from 2008 to 2010. Use it to generate the chart that will appear on this
slide. (02 marks)
Class 2008 2009 2010
S.1 100 170 140
S.2 120 200 60
S.3 150 70 50
S.4 160 90 150

(b) Insert a footer of your name and personal number on each of the slides.
(01 mark)

(c) Save and print your work. (02 marks)

3
3. (a) Using suitable database management software, create a database and name
it Student’s Bio Data. (01 mark)

Student Surname Other Date of Place of Sex Next Class Status Termly
ID Name Birth Birth of kin Fees
ST001 Kawa Fred 01/05/1990 Luwero Male Maje S5 Boarding 515,000
ST002 Kaye Sharif 05/02/1995 Wakiso Male Bute S1 Day 195,000
ST003 Logose Mary 17/09/1994 Mbale Female Site S5 Boarding 515,000
ST004 Bata Bena 20/06/1997 Kabarole Female Ville S3 Boarding 415,000
ST005 Obote Bonny 13/04/2000 Gulu Male Opeta S2 Boarding 390,000
ST006 Mane Abou 12/03/2002 Lira Male Obina S1 Boarding 455,000

(b) Create a table with appropriate data types and use it to enter the data in the
table. Name it Student’s Data Table. (06 marks)

(c) (i) Create a form displaying the following fields: Student ID, Surname,
Other Name, Sex and Status. Save it as Identity Form. (02 marks)

(ii) Insert your name and personal number in the form footer. (01 mark)

(d) Create a query displaying the following fields: Student ID, Surname,
Other Name, Class, Termly Fees and Yearly Fees. (Hint: Yearly Fees Equals
Termly Fees times three). Save the query as Totals Fees Query. (03 marks)

(e) Create a query to extract all students born after the year 1994 and before the
year 2000. Name it Birth Date Query. (03 marks)

(f) (i) Create a report displaying the following fields: Student ID, Surname,
Other Name, Date of Birth, Termly fees and Yearly Fees, sorted in ascending
order. Give your report a title School End of Year Report. (02 marks)
(ii) Insert your name and personal number in the Report Footer. (01 mark)

(g) Print al your work. (01 mark)

4
Turn Over
4. Your elder sister plans to make a birthday party for her daughter. You have
been assigned to design an Invitation Card for the guests.

(a) Using appropriate publishing software, create an invitation card that fit on an
A5 landscape page. (02 marks)

(b) (i) Use WordArt to write the main subject of your invitation as
“CRYSTAL’S BIRTHDAY PARTY”. (01 mark)

(ii) Change the WordArt outline to a dotted line. (01 mark)

(iii) Use an appropriate fill colour for the WordArt text. (01 mark)

(c) Using text boxes, personal creativity and design skills, appropriately layout
the text below on the rest of the card area. (06 marks)

Baby Crystal invites the company of………………………….to her second birthday on


Sun-30th Nov.2014.
Time: 2:00pm.
Come and Join us at Mariaz Gardens as we play, eat and sing with Crystal.
Lots of fun:
The bouncing Castle, Swimming in the through-carry your swimming
costumes.

 Emphasize the Date, Place and Time.


 Vary fonts, sizes and colours
 Use appropriate line spacing.

(d) Insert at least 3 relevant clip arts. (03 marks)

(e) Insert a header of your name and personal number. (01 mark)

(f) Apply a suitable background texture. (01 mark)

(g) Include an Auto-Shape with number “2” inside it.

 Use appropriate fill colour for both auto-shape and number. (02 marks)

(h) Save the card as Crystal Invitation-Card. (01 mark)

(i) Print the card. (01mark)

5
5. (a) Open an appropriate spread sheet software and enter the data shown in the
table below. Save it as your name and personal number. (06 marks)

S/N NAME SEX HIST CRE ECO GEO TOT AVE


1 Annet F 90 54 78 50
2 Amiru M 79 53 70 89
3 Samira F 87 65 69 45
4 Shukri F 76 57 82 45
5 Logose F 45 66 55 76
6 Opio M 76 44 76 87
Highest Score
Lowest Score
(b) Use the suitable formulae for parts (i)-(iv).

(i) In the TOT column, calculate the total score for each student. (02 marks)

(ii) In the AVE column, calculate the average score for each student. (02 marks)

(iii) In the Highest score row calculate the highest score per subject, the total
score and average score. (02 marks)

(iv) In the Lowest score row calculate the lowest scores per subject, total score
and average score. (02 marks)

(c) Create a suitable title for the table in spread sheet. (01 mark)

(d) Introduce a GRADE column after every subject and use the VLOOKUP
function to assign a correct grade for each subject to the table below. (04 marks)

MARK GRADE
00-34 F9
35-39 P8
40-44 P7
45-49 C6
50-54 C5
55-59 C4
60-69 C3
70-74 D2
75-100 D1

(e) Save and print your work. (01 mark)

END
6
S850/3
Subsidiary ICT
(PRACTICAL)
Paper 3
Nov./Dec.2014
2 hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
(PRACTICAL)
Paper 3
2 hours

INSTRUCTIONS TO CANDIDATES:

This paper is made up of five equally weighted questions.

Answer any three questions.

Any additional question(s) will not be marked

Each candidate is provided with a new blank Compact Disc (CD).

Candidates should continuous save your work.

Each candidate must produce a hard copy for each of their to accompany the
Compact Disc (CD

© 2014 Uganda National Examinations Board Turn Over


Attempt any three questions in this paper
1. (a) Using a word processor of your choice, type the document below as it
appears. Save your document as your name and personal number. (07 marks)
The path to wider access to telecommunications services.
Telecommunications reforms have led to more competitive markets in any of
the countries studied. The result has been impressive growth during half of the
2000s, particularly in mobile telephony. The challenge will be to sustain this
growth in the face of significant barriers.
A number of key policy recommendations, if followed, would sustain growth
and deepen access to telecommunications in the region.
 There is ample scope for further sector reform in most countries.
According to 2006 report from the GSM Association, poor regulation has
reduced telecommunications in Africa by US$4.6 billion.
 Countries should pursue liberalization by simplifying licensing regimes,
lifting remaining bars to market entry, ad examining the feasibility of
introducing mobile number portability and mobile virtual network
operators.
 Mobile telephone access should be incorporated into established goals for
universal access so as to leverage the successful spread of mobile
communications.
 High-speed connectivity over fibre cable is a pre-requisite for e-
government and other socioeconomically beneficial applications.
Source: Information and Communications Technology in Sub-Saharan
Africa: A sector review by Michael Minges.

(b) Copy and paste the text to the next page of your document. (01 mark)

(c) Change the heading to uppercase, font size of 16.5 and center it. (03 marks)

(d) Insert the footnote; “Is the provision of telephone services to phones which
may move around freely rather than stay fixed in one location” on the word
telephony. (02 marks)

(e) Insert your name and personal number as header. (01 mark)

(f) Insert the word “Telecommunications” as a watermark with font size 54.
(03 marks)

(g) Include page numbers whose format is alphabetical letters. (02 marks)

(h) Print your work. (01 mark)

1
2. (a) As a treasurer to your school’s Debating Club, use a spreadsheet software
to prepare the budget below. Save your work as your name and personal
number. (06 marks)

(b) Use appropriate formula/function to compute the.


(i) TOTAL COST per item. (02 marks)

(ii) DISCOUNT given-the discount is 1.3% of the TOTAL COST of an item.


(02 marks)

(iii) DISCOUNTED PRICE that the club will pay. (02 marks)

(c) Represent the items with their respective discounted prices on a pie chart.
Save it on another sheet. (05 marks)

(d) Insert your name and personal number as footer. (01 mark)

(e) Print all your work. (02 marks)

2 Turn Over
3. The table below shows some of the participants in an ICT youth conference
in Uganda.

(a) Use any database management software to create a database called ICT
Youth. (01 mark)

ICT Youth Table.

ID NUMBER NAME SEX DATE OF BIRTH DEPARTMENT ADDRESS


2014/1 Tushabe Adrine F 12-June-1980 Education Kasangati
2014/2 Nayebare Ritah F 23-February-1995 Insurance Masaka
2014/3 Ogwal Peter M 03-January-1990 Banking Jinja
2014/4 Gwokyala Grace F 14-March-1998 Technical Mbarara

(b) Create a table with appropriate data types and populate it using the data
above. Save it as ICT Youth table. (07 marks)

(c) Generate a form from the table. Save it as ICT Youth Form. (03 marks)

(d) Use a query to filter out all the youths excluding those from the Insurance
DEPARTMENT. Save it as ICT Youth Query. (04 marks)

(e) Use the table to generate a report for the participants. Save it as ICT Youth
Report. (03 marks)

(f) Print all your work. (02 marks)

3
4. Many people world over time, have tried to explain how important time is.
Many definitions have been given illustrated below;

 Time is a resource.
 Time is money
 Time wasted is never gained and many others
(a) You are required to prepare a 4-slide presentation to students advising
them on time management. (08 marks)
(b) Insert a link to www.google.com on the third slide and name it
“research”. (02 marks)
(c) Insert a self-updating time on each slide in your presentation. (02 marks)
(d) Insert relevant images to your presentation. (02 marks)
(e) Apply slide transitions to all your slides. (02 marks)
(f) Apply animations to the same of the presenter in the first slide.(02 marks)
(g) Save your work as your name and personal number. (01 mark)
(h) Print your work. (01 mark)

4
Turn Over
5. (a) Using a publishing software, design an identity card with the following
information below. (14 marks)

Identity card heading: Organization name of your own choice in WordArt


format

Address: P.O Box 234 Kampala

Telephone: 0413556887

Email Address: Organizational Email address

Website: Organizational website

Employee Name: Your name

Position: ICT Manager

ID Number: 2014/115

Date of issue: 01/01/2014

Expiry date: 01/01/2016

(b) Add an image to act as the owner’s photograph. (02 marks)

(c) Insert an appropriate logo. (02 marks)

(d) Save and print your work. (02 marks)

END

5
S850/2
Subsidiary ICT
(PRACTICAL)
Paper 2
Nov./Dec.2015
2 hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
(PRACTICAL)
Paper 2
2 hours

INSTRUCTIONS TO CANDIDATES:

This paper is made up of five equally weighted questions.

Answer any three questions.

Any additional question(s) will not be marked

Each candidate is provided with a new blank Compact Disc (CD).

Candidates should continuous save your work.

Each candidate must produce a hard copy for each of their to accompany the
Compact Disc (CD

© 2015 Uganda National Examinations Board Turn Over


Attempt any three questions in this paper

1. (a) Type the text below using an appropriate word processing program.
(04 marks)
The stocks and the Urchin
Of all the boys in the town, the most forward in singing nonsensical verse was
always the same on who had begun teasing the storks, a little urchin not
more than six years old. The young storks, indeed, fancied him a hundred
years old, because he was bigger than either their father or mother and what
should they know about the ages of children, or grown-up human beings!

All their schemes of ravages were aimed at this little boy; he had been the
first to tease them, and he teased them still. The young storks were highly
excited about it, and the older grew less they were inclined to endure
persecution. Their mother, in order to pacify them, at last promised that they
should be revenged, but not until the last day of their stay in that place.
Hans Christian Andersen
(b) Copy and paste this document to the next page. (01 mark)
(c) Change the heading to upper case, font comic sans ms, underline it with a
dotted line and font size 13. (03 marks)
(d) Justify the whole document. (01 mark)
(e) Change the line spacing for paragraph one to 1.5. (01 mark)
(f) Drop cap on two lines the letter beginning paragraph one. (01 mark)
(g) Create a footnote of the word “pacify” and it should have the statement “to
calm somebody who is angry”. (02 marks)
(h) Your name and personal numbers should appear as footer and in italics.
(02 marks)
(i) The name “Hans Christian Andersen” should be crossed through. (01 mark)
(j) Highlight the word “scheme” with colour yellow. (02 marks)
(k) Save this document as “Prose” (01 mark)
(l) Print your work. (01 mark)

1
2. The table below shows examination results of senior six students of
Mugo Secondary School. Study it and answer the questions that follow.

(a) Enter the student’s data above in a spread sheet application as shown.
(07 marks)
(b) Using appropriate functions, determine the:
(i) Average score for each subject. (02 marks)
(ii) Highest score for each subject. (01 mark)
(iii) Lowest score for each subject. (01 mark)
(iv) Median score for each subject. (02 marks)
(c) Make your worksheet landscape page orientation. (01 mark)
(d) Name your worksheet as Results. (01 mark)
(e) Use the relevant function to grade each student’s average by indicating:
(03 marks)
 Very good if average is greater than 80.
 Good if average is greater than 55.
 Poor if average is below 55.
(f) Save your work as your name and personal number. (01 mark)
(g) Print your work. (01 mark)

2 Turn Over
3. Titus is the new Marketing Manager of a company called “Inspirational
Aspirations Ltd”. The company is located at block 110, 7th street of
industrial area. The contact address is P.O Box 130, Nakasero. His email
address and telephone contacts are
[email protected] and +256414285193
respectively.
Using a desktop publishing application of your choice, help Titus to come
out with a designer “Business Card” through the following activities.
(a) Use an appropriate design to make eight identical cards per page.
(02 marks)
(b) Save your publication as “your name”. (01 mark)
(c) Using a ruler guide measure, take the following card dimensions-
width 3.5 inches and height 2 inches. (02 marks)
(d) Design one card with following details. Company logo of your choice,
Company Name; Name of employee; Designation; Location; Contact
Address; Email and Telephone contacts. (10 marks)
(e) Select all the contents on the card and group them into one object.
(02 marks)
(f) Apply an appropriate background colour to your card. (01 mark)
(g) Insert your name and personal number as a footer. (01 mark)
(h) Save and print out a copy of your work. (01 mark)

3
4. (a) Create a five-slide presentation about the introduction of Subsidiary
Information and Communication Technology (ICT) for A-level in Uganda.
In your presentation do the following:

(i) Slide I: Include the title “Report on the Introduction of Subsidiary ICT”.
(02 marks)

(ii) Slide II: State the reasons why Subsidiary ICT was introduced in Uganda.
(02 marks)
(iii) Slide III: Give the expected outcomes of studying Subsidiary ICT.
(02 marks)
(iv )Slide IV: List the problems that are faced in schools offering Subsidiary
ICT. (02 marks)
(v) Slide V: Make a conclusion thanking the Ministry of Education, Science,
Technology and Sports for introducing Subsidiary ICT to the Curriculum of
Uganda. (02 marks)
(b) Use appropriate transition schemes to view your presentation. (01 mark)
(c) Use appropriate animation schemes to view your presentation. (01 mark)
(d) Rehearse time your presentation with an appropriate timing of your choice.
(01 mark)
(e) Loop your presentation continuously. (01 mark)
(f) On the title slide apply a clip of the picture of a computer. (01 mark)
(g) The title should have the font size of 43.9, and it should appear different
from other slides. (01 mark)
(h) All the slides should bear a footer of your name and personal number except
the title slide. (01 mark)
(i) Apply appropriate colours for each slide. (01 mark)
(j) Save your work as your name and personal number. (01 mark)
(k) Print your work. (01 mark)

4
Turn Over
5. The table below represents SD employee payroll. Study it and answer the
questions that follow.
ID EMPLOYEE SEX AGE DEPARTMENT BASIC ALLOWANCE
NUMBER NAME SALARY S
U12 ASIIMWE F 52 COMPUTER 300000 20000
RUTH
U13 TUGUME M 41 HISTORY 620000 32000
RONALD
U14 TUGUME M 43 ECONOMIS 320000 50000
ROBERT
U15 NAMBI F 36 MATHS 450000 62000
TRACE

(a) Use a database Management Software to create a database for SD


employees. Save it as SD Database. (01 mark)
(b) Design a table and enter the given data. Save it as Employee table.
(08 marks)
(c) Use a query to filter out all female employees with their details. Save it as
Female query. (03 marks)
(d) (i) Generate a report from the employee table and save it as Employee
report. (02 marks)
(ii) Add a header to the report as SD EMPLOYEE PAYROLL and footer as
your name and personal number. (02 marks)
(e) Use a query to filter out employees who are between 40 and 45 years of age.
Save it as Aged. (03 marks)
(f) Save and print all your work. (01 mark)

5
S850/3
Subsidiary ICT
(PRACTICAL)
Paper 3
Nov./Dec.2015
2 hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
(PRACTICAL)
Paper 3
2 hours

INSTRUCTIONS TO CANDIDATES:

This paper is made up of five equally weighted questions.

Answer any three questions.

Any additional question(s) will not be marked

Each candidate is provided with a new blank Compact Disc (CD).

Candidates should continuous save your work.

Each candidate must produce a hard copy for each of their to accompany the
Compact Disc (CD

© 2015 Uganda National Examinations Board Turn Over


Answer any three questions in this paper

1. (a) Study the document below and answer the questions that follow.

Formatting Text Using office 2003 Toolbar

I
n word processing program such as Ms word, there are numerous options
available for presenting your text. This part of the tutorial will guide you through
several of the important features in word that will allow you to edit, modify and
display text (and non-text) components.

The standard Toolbar:


No. Button Function
1. New blank document Creates a new document
2. Open Helps to open an existing document.

Standard Toolbar buttons.


New blank Document:
Open
Save
Permission
Print
Print preview
Spelling and Grammar
Copy
Paste
Undo Typing
Insert Hyperlink
Insert Table

Word allows all toolbars to be customized, so you may not find all options
listed there. There are several buttons that may or may not appear immediately
in your version of Word.

1
(b) Using a word processor of your choice typeset the above document as it is.
(12 marks)
(c) Save your work as Formatting Exercise. (01 mark)
(d) Copy your document to the next page. (01 mark)
(e) Format your copy as follows:
(i) Apply colour green to the title of the document. (01 mark)
(ii) Set the line spacing of the last paragraph to 1.5 points. (01 mark)
(iii) Bullet the list of Standard Toolbar buttons. (01 mark)
(iv) Justify your text in the first paragraph. (01 mark)
(f) Insert a footer of your name and personal number. (01 mark)
(g) Print your work. (01mark)

2
Turn Over
2. The table below shows examination results of Senior Six Subsidiary ICT
students. Study it and answer the questions that follow.

(a) Enter the student’s data above in a spreadsheet program. (05 marks)
(b) Determine the final mark for every student by use of a formula. (02 marks)
(c) At the end of the table in the empty row after Akiiki Lucy, insert a
formula/function in the “AGE” column, to determine the age of the
youngest student. (02 marks)
(d) Insert in the table the title “STUDENT’S PERFORMANCE”. (01 mark)
(e) Insert a footer as your name and personal number. (01 mark)
(f) Plot a bar graph of the FINAL MARK against STUDENT’S NAME.
(i) Add a chart title as BAR GRAPH REPRESENTING STUDENT’S
PERFORMANCE.
(ii) Add axis titles. (05 marks)
(g) Copy your graph to another worksheet. (01 mark)
(h) Rename sheet one as MARKS and sheet two as GRAPH. (01 mark)
(i) Save your work as your name and personal number. (01 mark)
(j) Print your work. (01 mark)

3
3. Use publication software of your choice to design a library brochure of
Katale Secondary School. In your design, take into account the following.
(a) Divide the page into three identical parts. (06 marks)
(Your layout should look like this)

Brief introduction about The stock of text books in Library services


the library the library

Panel Two
Library Regulations School Address Face of the Brochure.

(b) Make a brief introduction about the library in two sentences. (02 marks)
(c) List five text books of your choice in the stock of text books. (02 marks)
(d) Give at least two library services. (02 marks)
(e) Outline at least two library Regulations of your choice. (02 marks)
(f) For the address use: (01 mark)
Katale Secondary School
P.O Box 1294, Gulu-Uganda
www.katalesecasch.ac.ug
(g) The face should have the heading as KATALE SECONDARY SCHOOL
LIBRARY. Centre the heading with font size 26.5. (02 marks)
(h) Add a clip art object of your choice in the place of the logo. (01 marks)
(i) Save your work with your name and personal number. (01 mark)
(j) Print your work. (01 mark)

4
Turn Over
4. Your teacher requested you to design a five-slide presentation of the topic
of networking which should be used for conducting a lesson in the Senior
Five Class.
(a) (i) Slide 1: Should have the introduction of the topic and the name of
the presenter. (02 marks)
(ii) Slide 2: Should have the advantages of networking computers.
(02 marks)
(iii) Slide 3: Should have the disadvantages of networking computers.
(02 marks)
(iv) Slide 4: Should have the factors affecting communication speed
on the network. (02 marks)
(v) Slide 5: Should have the hardware and software requirements for
networking. (02 marks)
(b) Apply minimal animations in your presentation. (02 marks)
(c) Insert relevant clip art in your slide. (01 mark)
(d) Insert your name and personal number as footer. (01 mark)
(e) Vary the background of all slides. (01 mark)
(f) Number all your slides. (01 mark)
(g) Make your presentation to run automatically after 3 seconds.
(02 marks)
(h) Save your work as Networking. (01 mark)
(i) Print your work. (01 mark)

5
5. The tables below were extracted from records of a school in Uganda.
Study them and perform the required tasks.
Table 1: Subject Table.

Subject No. of Subject Price per Student ID Combination ID


ID Subjects Date Subject
T1120 2 20-11-12 200 S6045 C1100
T1121 3 21-11-12 400 S6042 C1101
T1122 3 22-11-12 450 S6041 C1102
T1123 2 23-11-12 120 S6043 C1103
T1124 1 24-11-12 250 S6044 C1104
T1125 3 25-11-12 800 S6040 C1105
Table 2: Students Table
Student ID Student Name Gender Contact Code Student
Location
S6045 Tendo M +254 Masaka
S6042 Tim M +255 Soroti
S6041 Alex F +041 Tororo
S6043 Titus F +045 Mbarara
S6044 Teddy F +045 Arua
S6040 Theo M +070 Kitgum
Tasks
(a) Create a database called My School. (01 mark)
(b) Design table 1 with its appropriate name and data types. Use it to capture
the given data. (06 marks)
(c) Design table 2 with its appropriate name and use the lookup wizard for the
gender field data types. Use it to capture the given data. (04 marks)
(d) Create a relationship between the two tables. (02 marks)
(e) Create a query for all those students whose locations begin with letter “M”.
Include the field of Student ID, Student Name, Contact Code, Student
Location and No. of Subjects. Save it as M-Location. (04 marks)
(f) Write a query for table 1 to select those papers that were sat between 21st
and 25th November 2012. Save it as Mid-table. (02 marks)
(g) Print your work. (01 mark)
END

6
S850/2
SUBSIDIARY ICT
(PRACTICAL)
PAPER 2
Nov./Dec.2016
2 hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
(PRACTICAL)
Paper 2
2 hours

INSTRUCTIONS TO CANDIDATES:

This paper is made up of five equally weighted questions.

Answer any three questions.

Any additional question(s) will not be marked

Each candidate is provided with support files in the folder UNEB Support
Files on the Computer Desktop. Use the support files where applicable to
supplement the questions.

Each candidate is provided with a new blank Compact Disc (CD).

Candidates should continuous save your work.

Each candidate must produce a hard copy for each of their to accompany the
Compact Disc (CD)

© 2016 Uganda National Examinations Board Turn Over


1
Attempt any three questions on this paper

1. a) Using a word processor application, load the file OUR FOCUS.rtf and
save it as your name and personal number. (02 marks)
(b) Set the page size to A4. (01 mark)

(c) (i) Set the title and subtitles to Times New Roman font size 22 and the
rest of the text to Times New Roman font size 12. (02 marks)

(ii) Bold and underline the two subtitles. (02 marks)

(d) Apply another colour to the title and sub-titles. (01 mark)

(e) (i) Type a sentence related to the title in the Text box at the bottom.
(01 mark)

(ii) Move the Text box to any space in the main document. (02 marks)

(f) (i) Change the numbered list to a bulleted list. (01 mark)

(ii) Use the correct symbol for R registered trademark (02 marks)

(g) Insert an endnote in reference to the title with the words. (02 marks)
“This document here is very important for all”

(h) Insert the image from the file Academician.jpg into your document.
(01 mark)

(i) Insert your name and personal number in the header and align it left.
(02 marks)

(j) Save and print your work. (01 mark)

2
2. The statistics shows the rainfall in millimeters (mm) received in Kisoro
district in 2012:

January 63, February 81, March 117, April 186,


May 156, June 15, July 12, August 36,
September 147, October 144, November 153, December 60

(a) Use any spreadsheet application to enter the data above


save it as your name and personal number. (06 marks)
(b) Insert a suitable heading for the data. (02 marks)
(c) Use appropriate formulas to compute the rainfall received every month
in:
(i) 2013, if there was an increase of 5% from the previous year, 2012.
(02 marks)
(ii) 2014, if there was a decrease of 10% from that of 2013.
(02 marks)
(d) (i) Create a 3-D column chart showing month and annual rainfall
received in the 3 years. (03 marks)

(ii) Insert a suitable title for the graph and label the axis. (02 marks)

(e) Insert your name as header and personal number as the footer. (02 marks)

(f) Save and print all your work. (01 mark)

3
3. You have been asked to prepare a presentation about Agriculture in Uganda.

You are provided with the following resources;

-A folder called Picture part1 contains all the relevant pictures to be used
in the presentation.

-Some literature about Agriculture in Uganda. Refer to economy.rtf file.

(a) Use this data to prepare a four-slide presentation and save it as your
name and personal number Use Title and Content slide layout on all the
slides. (02 marks)

(i) Slide 1: Information about the presenter and the topic. (02 marks)

(ii)Slide 2: A simple definition of Agriculture. (02 marks)

(iii) Slide 3: Branches of Agriculture and their descriptions. (03 marks)

(iv) Slide 4: Conclusive remarks about Agriculture. (02 marks)

(b) Every slide should have a relevant image in the bottom right corner.
(02 marks)

(c) Apply some animation to all the titles. (02 marks)

(d) Apply a simple transition on the slides. (01 mark)

(e) Use action buttons in the left bottom corner. (02 marks)

(f) Insert a footer of your name and personal number. (01 mark)

(g) Save and print all your slides as handout on one page. (01 mark)

4
4. Use Database software of your choice, to open the file SPORTS
CLUB.mdb and save it as your name and personal number. (02 marks)
(a) (i) Assign Lookup data type to the field HOUSE.
(ii) Allocate appropriate data types to the other fields. (04 marks)
(b) Enter the data in the field HOUSE against the respective names as
shown in the table below: (02 marks)

NAME HOUSE
Kiconco Enid Muteesa
Mukyala Jenifer Mandera
Nakabugo Tricica Mandera
Nantongo Tania Muteesa
Ttenda Katrina Mandera
Ddumba Stevo Muteesa
Kitonsa Mike Kabalega
Kizimula Willy Kabalega
Omoni Jimmy Kabalega

(c) Sort in ascending order the data based on the FEES field. (02 marks)

(d) Create a form with all the fields in the table and call it Sports Form.
(03 marks)
(e) Create a query and use it to extract all female students whose contacts
start with 077 and 078. Name it Sports query. (03 marks)

(f) Generate a report from the form Sports query. Name it Sports Report.
(03 marks)
(g) Save and print your work. (01 mark)

5
5. Nalongo Secondary School is preparing to host old students for the
annual feast on 17th December at the school. You as the General
Secretary of the old Student’s Association, you are required to design an
Invitation card for the Old students.
(a) Use a suitable Publishing software to design the card and include the
following signatories at the bottom: (10 marks)
(i) Head teacher
(ii) Chairperson
(iii) General Secretary (type your name)

(b) Include on the card an appropriate logo. (03 marks)

(c) Insert attractive border art on the card. (02 marks)

(d) Produce 3 copies of the card which can fit on the same page. (02 marks)

(e) Save your work as your name and personal number. (02 marks)

(f) Print your work. (01 mark)

END

6
S850/3
SUBSIDIARY ICT
(PRACTICAL)
PAPER 3
Nov./Dec.2016
2 hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
(PRACTICAL)
Paper 3
2 hours

INSTRUCTIONS TO CANDIDATES:

This paper is made up of five equally weighted questions.

Answer any three questions.

Any additional question(s) will not be marked

Each candidate is provided with support files in the folder UNEB Support
Files on the Computer Desktop. Use the support files where applicable to
supplement the questions.

Each candidate is provided with a new blank Compact Disc (CD).

Candidates should continuous save your work.

Each candidate must produce a hard copy for each of their to accompany the
Compact Disc (CD)

© 2016Uganda National Examinations BoardTurn Over

1
Answer any three questions on this paper

1. (a) Using word processing software, load the file moralpaper.docx and
save it as your name and personal number. (02 marks)

(b) Underline the heading of the document.


(01 mark)
(c) Change the border with 6pt.
(02 marks)
(d) Centre align the whole document.
(01 mark)
(e) Insert the picture bet1.JPG as the header of the document.
(02 marks)
(f) Insert your name and personal number as footer of the document.
(01 mark)
(g) Insert page numbers at the bottom of your document starting from 5.
(02 marks)
(h) Insert an auto shape of your choice, in the document.
(i) Change the color of the auto shape to green.
(ii) Order it behind the text. (03 marks)

(i) Drop cap the first letter of the second paragraph to cover 2 lines.
(02 marks)
(j) Make the word “addictive” in the fourth paragraph a hyperlink to
www.google.com . (02 marks)

(k) Copy the whole document to another page. (01 mark)

(l) Save and print your work. (01 mark)

2
2. (a) Load a file called Products.xls and save it as your name and personal
number. (02 marks)

(b) Add three columns TOTAL COST, TOTAL SALES and PROFIT
after the last column. (01 mark)

(c) Using any suitable formulas, Calculate

(i) Total cost per product. (02 marks)

(ii) Total Sales per product. (02 marks)

(iii) Profit per product. (02 marks)

(d) Format all money with a dollar currency symbol.


(02 marks)
(e) Format all currency values to one decimal place
(01 mark)

(f) Change the column headers to 90 degrees orientation.


(01 mark)
(g) Centre all the column headers.
(01 mark)

(h) Apply all borders around all the data.


(01 mark)

(i) Rename sheet 1 as Shop1


(01 mark)

(j) Copy all the data on Shop1 to sheet 2 and rename it Shop2.
(01 mark)

(k) Using the data on shop2, filter it to show only products whose profit
exceeds$100,000. (02 marks)

(l) Save your work and print your work.


(01 mark)

3
3. The Director of Studies (DOS) of a school wishes to improve efficiency
in his office by designing a database for his students.
(a) Use a Database Management Software to design the student database
and save it as your name and personal number. (01 mark)

(b) Create the table given below and save it as Student Data Table.
(05 marks)

Reg.No. Name Sex Date-Birth Class Co-


curricular
RGS003 Nambi Tina F 1/23/1996 6A CHAPEL
RGS006 Guma Fred M 9/11/1995 6B SPORTS
RGS009 Okello Dan M 4/22/1996 6A MDD
RGS010 Busingye M 7//10/1996 6C NONE
Bob
RGS011 Sonia Patel F 12/1/1995 6A SPORTS
RGS014 Achol Faith F 1/13/1996 6B CHAPEL
RGS017 Saidi Ali M 2/11/1997 6C MDD

(c) Create another table with the data below and save is as Student
Clearance Table. (04 marks)

Reg.No. Lib-Status Fees-Bal Oth-Debts TOTAL-Bal

RGS003 CLEARED 0 12,000


RGS006 CLEARED 140,000 0
RGS009 CLEARED 52,000 10,000
RGS010 CLEARED 0 21,000
RGS011 DEFAULTER 100,000 0
RGS014 DEFAULTER 22,000 0
RGS017 DEFAULTER 0 0

(d) Create one-to-one relationship between the two tables.


(01 mark)
(e) Create a form for the Student Data Table; include a form header
“Students’ Data Entry Form”. Save it as Student Data Form. (02 marks)

(f) Create a report showing Name, Class, Lib-Status and Fees Bal. Save it as
Clearance Report.

4
(i) Group your records by Class.
(ii) Arrange your records in ascending order of Names.
(iii) Include a report footer of your name and personal number. (04 marks)

(g) Create a query for Student Clearance Table and in it, calculate TOTAL-
BAL which is the sum of Fees-Bal and Oth-Debts. Save it as Total Debts
Query.(02 marks)

(h) Print all your work. (01 mark)

4. E-Commerce is a financial business transaction that occurs over an


electronic network such as the internet.
(a) You are required to design a four-slide presentation on E-Commerce.
Save it as your name and personal number. (01 mark)
(i) Slide I: Introduction of the topic. (03 marks)
(ii) Slide II: Services offered by e-commerce. (03 marks)
(iii) Slide III: Advantages of e-commerce and some of this information
may be included; (03 marks)

 Shopping can take place at any time


 Customers can exchange goods
 Variety of commodities to order for
 A business does not pay premises
(iv) Slide: Disadvantages of e-commerce. Consider the following.
(03 marks)
 Less social interaction between the buyer and the
seller.
 It is possible to deal with a fake company and your
money may go in wrong hands.
 Many people do not trust electronic method of
payment used by e-commerce
(b) Use suitable animation and transition effects. (02 marks)
(c) Apply relevant Clip Art on all slides. (02 marks)
(d) Include your name and personal number a s header on each slide.
(02 marks)
(e) Save and print your work. (01 mark)

5
5. (a) Using any desktop publication software of your choice, create the
document below as it. (05 marks)

HAND WASH TODAY!


Why wash hands? When do I wash? Challenges in hand wash?

(b) Insert text from the file WASH.rtf into the appropriate auto shapes.
(03 marks)

(c) Insert bullets on the text in the auto shapes.


(02 marks)

(d) Fill shapes and background with light colours of your choice.
(03 marks)

(e) Enhance the arrows connecting the auto shapes with a 3pt weight size.
(02 marks)

(f) Insert the picture from the file NO GERMS.rtf in the title text box.
Resize the picture to fit in the textbox. (03 marks)

(g) Insert footer as your name and personal number.


(01 mark)

(h) Save and print your work. (01 mark)


END

6
S850/2
Subsidiary ICT
(PRACTICAL)
Paper 2
Nov./Dec.2017
2 hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
(PRACTICAL)
Paper 2
2 hours

INSTRUCTIONS TO CANDIDATES:

This paper is made up of five equally weighted questions.

Answer any three questions.

Any additional question(s) will not be marked

Each candidate is provided with support files in the folder UNEB Support
Files on the Computer Desktop. Use the support files where applicable to
supplement the questions.

Each candidate is provided with a new blank Compact Disc (CD).

Candidates should continuous save their work.

Each candidate must produce a hard copy for each of their to accompany the
Compact Disc (CD) .

© 2017 Uganda National Examinations Board Turn Over


1. (a) Using a suitable word processor, create the following table of
information belonging to Madiba Enterprises Limited. Save it as your
name and personal number. (05 marks)
Name Age Sex Salary
Munyagwa 28 M 450,000
Bbaale 30 M 550,000
Bena 25 F 950,000
Namusisi 26 F 380,000
Cosy 27 M 400,000
Daniella 32 F 600,000
Akello 34 F 560,000
Faluk 38 M 760,000
Kiwa 37 M 850,000
Manafwa 25 F 865,000

(b) Make a copy of the table onto the next page. (01 mark)
(c) Sort the records in the table in descending order of Salary. (01 mark)
(d) Italicize the column headings and change them to font size 15. (02 marks)
(e) (i) Add a row at the bottom of the table.
(ii) Use in-built formulae to the average age and total salary. (02 marks)
(f) (i) Insert a column to the right of the table and merge cells.
(ii) Type the text “Salary is paid on 28th day of every month without fail”
and align it vertically in the center. (03 marks)
(g) Insert a row at the top of the table and insert a suitable heading. (02 marks)
(h) Align your table in the centre of the table. (01 mark)
(i) Insert a header containing your name and personal number in capital letters.
(02 marks)
(j) Save and print your work. (01 mark)

1
2. In this era of Information Technology, youth are vulnerable to many
challenges in their life. Assuming you are appointed health prefect of
your school and you are required to make awareness about abstinence;
a) Use a suitable presentation software to design a five-slide presentation
about abstinence and include the following information.
i. Slide 1: The topic, your name and current automatic date. (03 marks)
ii. Slide 2: Introduction and definition of abstinence. (02 marks)
iii.Slide 3: Advantages of abstinence among the youth. (03 marks)
iv.Slide 4: Youth affected by early sex in 2009-20%, 2010-30%, 2011-27%,
2012-33%, 2013-35%. Represent the data in a tabular form. (03 marks)
v. Slide 5: Use a column chart to represent the data in slide four.
(03 marks)
b) Insert relevant graphics in your presentation. (02 marks)
c) Apply a suitable animation to your presentation. (01 mark)
d) Insert a footer as your name and personal number. (01 mark)
e) Save your presentation as your name and personal number. (01 mark)
f) Print your presentation as handout on one page. (01 mark)

2
3. (a) Using an appropriate database program, load the file POPU. Save it as
your name and personal number. (02 marks)
(b) Open the table “Nation” in Design View and adjust the data types
appropriately. (04 marks)
(c) Enter the following details in the field IDNo. (02 marks)
N001 N002 N003 N004 N005 N006 N007 N008 N009 N010
N011 N012 N013 N014 N015 N016 N017 N018 N019 N020

(d) Delete the default ID field from the table and make IDNo the primary
key. (02 marks)
(e) Create a query including the fields od NAME, SEX and MARRIAGE
to select all those female citizens who are not married. Save the query as Status.
(02 marks)
(f) Make another query with only the concerned fields to display families living
in semi-permanent houses and having the number of members in the family
which is 12 and above. Save it as Semi Permanent. (03 marks)
(g) Produce a report showing all fields except the fields; DATE OF BIRTH and
MARRIGAE STATUS. Save it as Final Report. (02 marks)
(h) Insert a footer as your name and personal number on the report. (01 mark)
(i) Save and print your work. (02 marks)

3
4. (a) Use a publication software to open the file phone.pub and save it as
your name and personal number. (02 marks)
(b) Insert a text box of height 0.791” and width 8.936’’ on the top most part of
the page and do the following; (01 mark)
i. Type “YUNNO SENIOR SECONDARY SCHOOL” (01 mark)
ii. Change the font type to Rockwell condensed size 28 and any color.
(02 marks)
iii. Insert a logo of your choice in any appropriate position of the text box.
(02 marks)

(c) (i) Insert any two pictures from the folder images, in the positions labelled
No1 and No2. Resize the pictures to fit in the text boxes. (02 marks)

(ii) Type “Invitation to silver jubilee celebrations” between the two images and
change the font type to Old English Text MT size 24. (03 marks)

(d) Group all the layout objects. (02 marks)

(e) Type the following text in the area marked Z and centre align it. (03 marks)

Dear
Mr/Mrs/Rev/Hajji……………………………………………………………
You are hereby invited to attend the schools silver jubilee celebrations due
to take place on 15th December this year at 10:00am at the school’s
Rwakanengyere square.

(f) Type in your name as the recipient of the invitation. (01 mark)

(g) Save and print your work. (01 mark)

4
5. (a) Using any spreadsheet program, load the file Data which shows the
number of votes obtained by Chairperson Local Council five (LCV)
candidates in different counties of a district. Save your work as your
name and personal number. (02marks)
(b) Add two columns: TOTAL and POSITION. (01 mark)
(c) Using any relevant formula, calculate:
i. Total votes
ii. Position

(d) Skip one row after the last candidate and type the word Highest Votes.
Calculate the highest number of votes for each county. (02 marks)

(e) In the next new row, type the word Total Voters. Calculate the total number
of voters per county. (02 marks)

(f) Format the table to fit on one page. (01 mark)

(g) (i) Insert two rows above the first row. (01 mark)
(ii) Type an appropriate heading for the table and centre it. (01 mark)

(h) Insert a 2D stacked line chart for all candidates and their votes in the
countries EXCEPT county C. (02 marks)

(i) Add an appropriate chart title and axis titles. (02 marks)

(j) Transfer the chart onto another sheet. (01 mark)

(k) Insert a header of your name and personal number. (01 mark)

(l) Save and print your work. (01 mark)

5
S850/2
Subsidiary ICT
(PRACTICAL)
Paper 3
Nov./Dec.2017
2 hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
(PRACTICAL)
Paper 3
2 hours

INSTRUCTIONS TO CANDIDATES:

This paper is made up of five equally weighted questions.

Answer any three questions.

Any additional question(s) will not be marked

Each candidate is provided with support files in the folder UNEB Support
Files on the Computer Desktop. Use the support files where applicable to
supplement the questions.

Each candidate is provided with a new blank Compact Disc (CD).

Candidates should continuous save their work.

Each candidate must produce a hard copy for each of their to accompany the
Compact Disc (CD) .

© 2017 Uganda National Examinations Board Turn Over


Answer any three questions in this paper

1. (a) Using a word processing software, open the file document xy and
save it as your name and personal number. (02 marks)
(b) Underline the heading with a dotted line. (01 mark)
(c) Drop cap by three lines the first paragraph. (02 marks)
(d) Convert two into two columns with a line in between them.
(02 marks)
(e) Insert page numbers, center aligned in the A, B, C format.
(02 marks)
(f) Insert an appropriate watermark of size 38. (02 marks)
(g) Insert a page break after the first paragraph. (01 mark)
(h) Insert the image100.jpg on the first page. (03 marks)
(i) Apply a page boarder on the first page only. (01 mark)
(l) Insert your name as header and today’s date as the footer.
(02 marks)
(k) Set paper size to A5 for the whole document and print your work.
(02 marks)

1
2. As an ICT student, you are required to use a suitable publication
software and design a font cover page for the magazine called
Agriculture for Better as follows.
a) Use appropriate layout, paper balance, font variation and
relevant pictures. Save it as your name and personal number.
(10 marks)
b) Insert a clip to represent the writer at the bottom of the cover.
(02 marks)
c) Use your name as the author of the magazine. (01 mark)
d) Insert automatic current date to appear as the date of
publication. (02 marks)
e) Apply suitable background for the cover. (03 marks)
f) Insert your name and personal number as header. (01 mark)
g) Save and print your work. (01 mark)

2
3. A medical centre wishes to computerize all its patient’s records.
a) Create a database for the centre and save it as your name and
personal number. (01 mark)
b) In Design view, create a Table with the following properties
and save it as Patients Bio Table. (03 marks)
Field Name Properties
Patient’s Name Text (20)
Sex Text (1)
Residence Text (25)
Patient Code Text (04)
Date of Visit Date/Time(short Date)
Diagnosis Text(25)

c) Create a form for Patient Bio Table and enter the records
below, save it as Patient Bio Form (03 marks)

Patient Name Sex Residence Patient Date of Diagnosis


Code Visit
Adriko Sam M Kasese ADS009 3/4/2006 Malaria
Akech Sally F Bulamu ADS010 13/01/2006 Septic wound
Ddumba Zam F Rubaga ADS011 21/11/2005 Infection in chest
Talemwa Steve M Kasawo ADS012 3/10/2006 Malaria
Sango Dan M Bulenga ADS013 13/03/2006 Inflamed joints

d) In Design view, create another table with the following


properties and save it as Patient billing Table. (04 marks)
Field Name Properties
Patient Code Text(4), Primary Key
Prescription Memo
Consult Fee Number
Treat Fee Number
Medical Bill Number
Medical is a calculate field which is Consult fee + Treat fee

3
e) Populate the Patient Billing Table with the following data.
(03 marks)

Patient Code Prescription Consult fee Treat fee Medical bill

ADS009 Dualcortem 15,000 25,000


ADS010 Tetanus vaccine, 15,000 20,000
daily dressing
ADS011 Ciproflaxin tabs, PPF 15,000 15,000
injection
ADS012 Chloroquine 15,000 30,000
injection
ADS013 Referred to Sickle 15,000 5,000
Cell Clinic-Mulago

f) Create a one to one relationship between the Patient Bio


Table and the Patient Billing Table. (01 mark)
g) Create a query which extracts from Patient Bio Table only
those who were not diagnosed with Malaria. Save it as Anti-
Malaria. (02 marks)
h) (i) Create a report showing Name, Residence, Prescription and
Medical Bill. Save it as Clinic Report. (01 mark)
(ii) Include a report footer of your name and personal number.
(01 marks)
i) Print all your work. (01 mark)

4
4. As a peer educator, you have been told to prepare for a workshop
where you will address the youth about a topic “Adolescence”. A
folder called images has been provided to help you get all the related
pictures.
a) Prepare a presentation with six slides about adolescence as
follows.
i. Slide one: Introduction about the topic. (02 marks)
ii. Slide two: Characteristics of male adolescents. (02 marks)
iii. Slide three: Characteristics of female adolescents. (02 marks)
iv. Slide four: Effects of uncontrolled adolescence. (02 marks)
v. Slide five: Advice to adolescents. (02 marks)
vi. Slide six: Telephone contact is 256-56418545, website address
is www.youthclub.org and email is [email protected].
(01 mark)
b) Select any four pictures and insert them on appropriate slides.
(04 marks)
c) The presentation should run automatically without stopping.
(01 mark)
d) Insert your name and automatic date as footer. (02 marks)
e) Save your presentation as your name and personal number.
(01 mark)
f) Print all your slides on one page. (01 mark)

5
5. (a) Using an appropriate spreadsheet application, load the file Exam
results and save it as your name and personal number. (02 marks)
(b) Rotate the titles to an angle of 60 degrees. (02 marks)
(c) Copy the table to sheet 2 and rename the sheet modified.
(02 marks)
(d) Using appropriate functions compute;
i. Total marks obtained by each student to be placed in column P.
(03 marks)
ii. Average marks to one decimal place obtained in the compulsory
subjects (English, Mathematics, History, Biology and
Chemistry). Place the average marks in column Q. (03 marks)
iii. The number of students who sat for computer as one of their
option subjects. Place the result in cell C25. (02 marks)
iv. The highest score obtained in Chemistry. Place the result in cell
C26. (02 marks)

(e) Sort the student’s records in descending order according to


their total mark. (01 mark)
(f) Insert a footer of your name and personal number. (01 mark)
(g) Include all borders on the table. (01 mark)
(h) Save and print your work. (01 mark)

6
S850/2
Subsidiary ICT
PRACTICAL
Paper 2
Nov./Dec.2018
2 hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
(PRACTICAL)
Paper 2
2 hours

INSTRUCTIONS TO CANDIDATES:

This paper is made up of five equally weighted questions.

Answer any three questions.

Any additional question(s) will not be marked

Each candidate is provided with support files in the folder UNEB Support
Files on the Computer Desktop. Use the support files where applicable to
supplement the questions.

Each candidate is provided with a new blank Compact Disc (CD).

Candidates should continuous save their work.

Each candidate must produce a hard copy for each question answered to
accompany the Compact Disc (CD).

1
© 2018 Uganda National Examinations Board Turn Over
Answer any three questions in this paper

1. (a) Access the file IntrodWP.rtf and save it as your name and personal number.
(02 marks)
(b) Set the margins as; Top 1”, Bottom 1”, Left 1” and Right 1”. (02 marks)
(c) Format text to font size 12 and apply double line spacing. (02 marks)
(d) Apply a Drop cap on the first paragraph. (02 marks)
(e) (i) Make a bulleted list from the data in the second paragraph. (01 mark)
(ii) Split the list into two columns. (02 marks)
(f) Insert an appropriate heading for the text. (02 marks)
(g) Draw 4 point coloured line below the heading. (02 marks)
(h) Insert a watermark of your name. (02 marks)
(i) Insert a picture from the folder Images1 and send it behind. (02 marks)
(j) Save and print your work. (01 mark)

2
2. The following students sat for their term two examinations in Mathematics(mat),
Computer Studies (comp) and Commerce (com) and obtained the following marks:

John scored 40 in mat, 20 in comp and 50 in com, Mary scored 90 in mat 60 in


comp, 30 in com. Tamia scored 70 in mat, 65 in comp, and 90 in com. Samuel
scored 55 in mat, 40 in com and 80 in com. Paul scored 50 in mat, 20 in comp and
35 in com. Albert scored 50 in mat, 60 in comp and 50 in com. Mersey scored 20
in mat, 90 in comp and 77 in com. Muzamil scored 80 in mat, 69 in comp and 50 in
com while Timothy scored 30 in mat, 60 in comp and 57 in com.

(a) Enter the given data in a spreadsheet using appropriate column headings and
a table title. Save your work as your name and personal number. (06 marks)
(b) Use a formula in Column E to compute the average score for each student
and name it AVERAGE MARK. (02 marks)
(c) Sort the data in descending order based on column E. (01 mark)
(d) Incline the column headings to an angle of 450. (02 marks)
(e) (i) Create a column graph for the students’ marks in the three subjects.
Label your graph appropriately.
(ii) Move the graph to a new sheet and rename it as Students’ Marks.
(04 marks)
(f) Use an appropriate formula in column F to grade the students with the
criteria below:
EXCELLENT for all students with an average mark of 70 and above, PASS
for those with an average mark of 50 and above, but less than 70 and FAIL
for all students with an average mark below 50. (03 marks)
(g) Apply all borders on the data. (01 mark)
(h) Save and print all your work. (01 mark)

3
3. Use presentation software to design a five-slide presentation on Safe Water
Management.
(a) The slides should include:
(i) Slide I: Title and Introduction. (02 marks)
(ii) Slide II: Sources of water. (02 marks)
(iii) Slide III: Ways of making water safe for drinking. (02 marks)
(iv) Slide IV: Waterborne diseases. (02 marks)
(v) Slide V: Conclusion. (02 marks)
(b) Insert appropriate pictures from the folder Images2 on your slides. (03 marks)
(c) Set the date to update automatically. (01 mark)
(d) Set a transition loop of 10 seconds for all the slides. (02 marks)
(e) Insert your name and slide number as footer. (01 mark)
(f) Save your presentation as your name and personal number. (01 mark)
(g) Print your slides as handout on one page. (02 marks)

4
4. (a) Using any database management system software of your choice, create a
database to handle patient’s data. Save it as your name and personal number.
(01 mark)
(b) Open a file called Patients.xls. Copy that data and use it to create a database
table called OPD Table. (02 marks)
(c) Apply the most appropriate data types to the fields in OPD Table. (01 mark)
(d) Apply a primary key on an appropriate field. (01 mark)
(e) Use a Lookup wizard for the SEX field and fill in Male and Female. (02 marks)
(f) Sort the data in the table in descending order of AMOUNT PAID. (01 mark)
(g) Create a form called Patient’s Form containing all the fields in OPD Table.
(01 mark)
(h) On this form, create a new field NEW AMOUNT PAID if AMOUNT PAID is
increased by 10%. (02 marks)
(i) Create a query called Aged Patients showing patients born before 1990.
(02 marks)
(j) Create another query called Typhoid bush showing patients and come from
Bushenyi district. (02 marks)
(k) Create a report showing patients born before 1990. Call it Aged Report.
(02 marks)
(l) Insert a footer as your name and current date in the report. (02 marks)
(m) Print all your work. (01 mark)

5
5. Use Desktop publishing software to prepare a brochure for JK Computer Center
with the following details.
Company Name: JK Computer Center
Motto: Computer skills for better standards.
Location: Seventh Street, Jinja Road
Address: P.O Box 23, Kampala
Telephone Contact: 0773458098, 0712070797, 0707587473
E-mail Address: [email protected]
Website: http://www.jkcomputer

Introduction: JK Computer Center is a home of computer services and


accessories. We have customer centered service providers. Please come and enjoy
our excellent services.

Services offered: Internet services, Printing, Photocopying, Scanning, Binding,


Mobile Money, Computer and phone repair, Computer and phone accessories,
Airtime selling, Telecommunications services, Report writing, Typing and
Computer lessons.

(a) Divide each page into three panels. (03 marks)


(b) Enter the given details in suitable panels. (08 marks)
(c) Use appropriate images, fonts and background in the brochure. (06 marks)
(d) Add your name and personal number as footer. (01 mark)
(e) Save your brochure as your name and personal number. (01 mark)
(f) Print your work. (01 mark)

END

6
S850/3
Subsidiary ICT
PRACTICAL
Paper 3
Nov./Dec.2018
2 hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
(PRACTICAL)
Paper 3
2 hours

INSTRUCTIONS TO CANDIDATES:

This paper is made up of five equally weighted questions.

Answer any three questions.

Any additional question(s) will not be marked

Each candidate is provided with support files in the folder UNEB Support
Files on the Computer Desktop. Use the support files where applicable to
supplement the questions.

Each candidate is provided with a new blank Compact Disc (CD).

Candidates should continuous save their work.

Each candidate must produce a hard copy for each question answered to
accompany the Compact Disc (CD).

© 2018 Uganda National Examinations Board Turn Over


Answer any three questions in this paper

1. (a) Using a word processor application, load the file Mercedes.rtf. (01 mark)
(b) Save the file as your name and personal number. (01 mark)
(c) Cut the last sentence of the text and paste it as a centered heading.
(02 marks)
(d) Double underline the heading. (01 mark)
(e) Arrange your work in three columns except the heading. (03 marks)
(f) Insert at the beginning of the first column the image mercedes.jpg and
apply a tight text wrapping. (02 marks)
(g) Resize the picture to 1.12” height and 2.0” width. (02 marks)
(h) Apply double line space and a justify alignment to your work. (02 marks)
(i) Insert a suitable word of your choice as watermark. (02 marks)
(j) Apply a 6pt page border of any colour around your work. (01 mark)
(k) Insert your name, personal number and an automatic date as footer.
(01 mark)
(l) Save and print your work. (01 mark)

1
2. (a) Using spreadsheet software, open the file overtime.xls and save it as your
name and personal number. (02 marks)

(b) Format the DATE column to display date in this format 31-feb-2015.
(01 mark)
(c) (i) Insert in cell E2 the column name REGULAR WAGE.
(ii) Compute in E2 the wages earned for regular hours at a rate of
Sh.3100 per hour. (02 marks)
(d) (i) Insert in cell F2 the column name OVERTIME WAGE.
(ii) Compute in column F the wages earned for overtime hours at a rate of
Sh.3300 per hour. (02 marks)
(e) Compute in the G the total wage earned by the labourers.
Name the column GROSS. (02 marks)
(f) In column H, compute the income tax that is 17% of gross.
Name the column TAX. (02 marks)
(g) Compute the net pay of each labourer. (02 marks)
(h) Revise the title to include the computed information. (01 mark)
(i) Use a column chart to illustrate each labourer’s regular and overtime wage
(04 marks)
(j) Apply all borders to your data. (01 mark)
(k) Save and print your work. (01 mark)

Turn Over
3. The table below gives information about some students in XY Secondary
School.

Reg.No. Names Class Age Sex House


001 Gadibe G. S5 18 M Nasser
002 Nabakiibi J. S1 13 F Kenyatta
003 Bbaale B. S2 15 M Mandela
004 Ddungu W. S3 16 M Lubega
005 Agwang F. S1 14 F Mwanga
006 Opeta T. S3 16 F Mandela
007 Kapere R. S5 19 M Mwanga
008 Cossy K. S5 20 M Kenyatta
009 Mpuuta V. S3 18 M Kenyatta
010 Nampa T. S1 12 F Lubega

(a) Create a database and save it as your name. (01 mark)


(b) Design a table with appropriate data types and enter the given data. Name
it as Registration Table. (07 marks)
(c) Design a query to extract all male students above 18 years of age and
name it Mature. (03 marks)
(d) Create a form which will display records in the table. Name it
Registration Form. (04 marks)
(e) Create a report to display student’s details with names arranged in
alphabetical order. Name it Registration Report. (03 marks)
(f) Print all your work. (02 marks)

3
4. (a) Prepare a four-slide presentation about a hotel business as follows
(i) Slide One: Hotel name in Word Art format, the hotel address and
an image. (04 marks)
(ii) Slide Two: Use bullets to outline the services offered. (02 marks)
(iii) Slide Three: Use a table to show the hotel menu for breakfast and
Lunch. (05 marks)

(iv) Slide Four: Use images or text to represent various prices of the
drinks. (04 marks)
(b) Add your name and personal number as header to all slides. (02 marks)

(c) Save your work as your name and personal number. (01 mark)

(d) Print all the slides on one page. (02 marks)

4
5. (a) Using a publishing software, design a certificate of merit to be awarded to
participants in a debating competition. The motion of the debate is The
Teaching of ICT has brought more positive effects that negative effects.
Save your work as your name and personal number. (02 marks)

(b) Set the dimensions of the certificate to width 11 inches and height 8.5
inches. (02 marks)

(c) Provide an appropriate title and apply Word Art in the title. (03 marks)
(d) (i) Use relevant content of a certificate and also include the motion of the
debate. (05 marks)
(ii) Include your name and the recipient of the certificate. (01 mark)
(e) Insert any logo from the folder Images. (02 marks)
(f) Use a suitable background for your certificate. (02 marks)
(g) Apply a border to enclose your certificate. (02 marks)
(h) Save and print your certificate as your name. (01 mark)

END
5
S850/2
Subsidiary ICT
PRACTICAL
Paper 2
Nov./Dec.2019
2 hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
(PRACTICAL)
Paper 2
2 hours

INSTRUCTIONS TO CANDIDATES:

This paper is made up of five equally weighted questions.

Answer any three questions.

Any additional question(s) will not be marked

Each candidate is provided with support files in the folder UNEB Support
Files on the Computer Desktop. Use the support files where applicable to
supplement the questions.
Each candidate is provided with a new blank Compact Disc (CD).

Candidates should continuous save their work.

Each candidate must produce a hard copy for each question answered to
accompany the Compact Disc (CD).

© 2019 Uganda National Examinations Board


Turn Over
1
Answer any three questions in this paper

1. (a) The table below shows part of a timetable for World of Wonders
Secondary School.

MONDAY TUESDAY WEDNESDAY

ENJOY YOUR CAREER


8:00-8:30 PARADE PARADE ASSEMBLY

8:30-9:30 MATHS BIOLOGY CHEMISTERY

9:30-10:30 ENGLISH PHYSICS COMPUTER

BREAK

(a) Use a word processor to produce the table above. Save it as timetable.
(09 marks)
(b) Add an appropriate heading to the table and centre it. (02 marks)
(c) Highlight the days with a light colour. (02 marks)
(d) For the text “ENJOY YOUR CAREER”, use Algerian font face and size
12.5. (02 marks)
(e) Copy and paste the table to another page. (01 mark)
(f) Add centre-aligned page numbers in the bottom margin. (02 marks)
(g) Insert a footer of your name and personal number. (01 mark)
(h) Save and print all your work. (01 mark)

2. Use presentation Software to create five-slide presentation as follows:


(a) SLIDE I:
i. Use Word Art to add the slide title: TOURISM IN UGANDA.
ii. Use text boxes to include the following tourist activities Game and
Bird Viewing, Boating and WaterSports, Hiking and Mountain
Climbing.
iii. Each text box should be accompanied by an appropriate Clip Art
Image. (03 marks)

(b) SLIDE II:


2
i. Copy the slide title from slide 1 and paste it as slide title on slide II.
ii. Insert the following text:
Tourism is the travel from recreational, leisure, or
business purposes, usually for a limited duration.
(02 marks)
(c) SLIDE III:
i. Insert the slide title: Game and Bird Viewing.
ii. Include the following text:
Game viewing is the most popular tourist activity in
Uganda. Wild animals like lions, buffaloes, giraffes,
antelopes and elephants are common in Uganda’s national
parks. (02 marks)
(d) SLIDE IV:
i. Add the slide title: Boating and Water Sports.
ii. Include the following text:
Uganda has a variety of water bodies that are popular
spots for tourism. White water rafting in Jinja is a
popular activity on River Nile. (02 marks)
(e) SLIDE V:
i. Insert the slide title: Hiking and Mountain climbing
ii. Include the following text:
Uganda has may opportunities for mountain climbing,
hiking and nature walks. Mt. Rwenzori which is found at
the border with DRC, is one of the highest mountains.
(f) Include at least two Clip Art Images on slides II to V and spread the
content so that the space is optimally utilized on each slide. (04 marks)
(g) Insert a footer of your name and personal number on each slide.
(01 mark)
(h) Insert a slide number on each slide. (01 mark)
(i) On slide I, select the Clip Art of “Game and Bird Viewing” text box and
insert a Hyper link to slide 3. (02 marks)
(j) Save and print your slides as handout. (01 mark)

Turn Over
3
3. (a) Using a spreadsheet software, open then file my retail shop and save it as
your name and personal number. (02 marks)
(b) Format the currency values to Ugandan Shillings, using the symbol UgX.
(02 marks)
(c) Type the following labels in the cells: (02 marks)
A15 Total sales
A16 Highest sales
A17 Lowest sales
A18 Average sales
(d) Type the column titles SALES in cell D1 and COMMISSION in the cell
E1. (01 mark)
(e) Use appropriate formula to calculate
(i) The SALES for each item. (02 marks)
(ii) Total sales for all items. (02 marks)
(iii) The Highest sales, Lowest sales and Average sales. (03 marks)
(iv) The COMMISSION at 5% of the sales, given to the sales person.
(02 marks)
(f) Insert a row at the top of the worksheet and enter a suitable heading for
the data. (02 marks)
(g) Insert a current date and time in the footer. (01 mark)
(h) Save and print your work. (01 mark)

4. (a) Using any publication software, create a blank page as shown below.
Save it as your name and personal number. (04 marks)

5
4

4
(b) Link text boxes 2 and 6 such that information in text box 2 flows to text
box 6. (02 marks)
(c) Open the files Newsletter. (01 mark)
(d) Copy all the text in the first and second paragraphs from the file
Newsletter and paste it in textbox 2. (01 mark)
(e) Drop cap on the first paragraph in text box 2. (01 mark)
(f) Copy the last paragraph from Newsletter and paste it in textbox 5.
(01 mark)
(g) In text box, type a suitable heading for the Newsletter article. (01 mark)
(h) Using Word Art, type the word Daily Brain on top of text box 1 as the
name of the Newsletter. (02 marks)
(i) Load an image Birds and fit from the folder Images. (03 marks)
i. Fit it in the textbox 4.
ii. Flit the picture horizontally.
(j) Load another image Lands.JPG from the folder Images and fit in
textbox 3. (02 marks)
(k) Insert a footer of your name and personal number. (01 mark)
(l) Save and print your work. (01 mark)

5. (a) Use a database management system to load the file Vehicle.


Save it as your name and personal number. (02 marks)
(b) Assign an appropriate data type to every fields. (03 marks)
(c) Make Audi the default value for the CAR MAKE field. (02 marks)
(d) Create a form for entering the CAR MAKE, STOCK NO and QTY.
Name it My Form. (02 marks)
(e) Create a query to filter cars which are in stock. Name it In stock.
(02 marks)
(f) Create another query showing the TOTAL COST obtained by
multiplying COST with QTY. Name it Total Cost. (03 marks)
(g) Create a report using the query Total Cost. Save it as Total Cost report.
(03 marks)
(h) Insert image vehicle.jpg as logo in your report. (01 mark)
(i) Add a footer of your name and personal number. (01 mark)
(j) Save and print your work. (01 mark)

5 END
S850/2
Subsidiary ICT
PRACTICAL
Paper 3
Nov./Dec.2019
2 hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
(PRACTICAL)
Paper 3
2 hours

INSTRUCTIONS TO CANDIDATES:

This paper is made up of five equally weighted questions.

Answer any three questions.

Any additional question(s) will not be marked

Each candidate is provided with support files in the folder UNEB Support
Files on the Computer Desktop. Use the support files where applicable to
supplement the questions.
Each candidate is provided with a new blank Compact Disc (CD)..

Candidates should continuous save their work.

Each candidate must produce a hard copy for each question answered to

accompany the Compact Disc (CD).

© 2019 Uganda National Examinations Board


Turn Over
1
Answer any three questions in this paper

1. (a) Using a word processor, load the file education and save it as your name
and personal number. (02 marks)
(b) Insert a picture pup.jpg as a water mark. (02 marks)
(c) Change font size of the whole text to 13. (01 mark)
(d) Add a suitable heading for the text and format it with the Title style.
(03 marks)
(e) Justify the whole text. (02 marks)
(f) Insert borders on the last paragraph. (02 marks)
(g) Add a footnote on the word education (which is bold) with a statement
defining education. (03 marks)
(h) Copy all the content of the document to another page. (01 mark)
(i) Insert any page number apart from the Arabic numerals (1,2,3...) on top
of the pages. (02 marks)
(j) Insert a footer of your name and personal number. (01 mark)
(k) Save and print your work. (01 mark)

2. Using a Desktop Publisher to design a four-page THANK YOU CARD for


your best teacher with the following guidelines:
(a) Select a blank ½ A4-Top Fold paper size. (02 marks)
(b) PAPER 1: Use Word Art features to design the individual characters of
the word THANK YOU. (04 marks)
i. Include relevant Clip Art or other images.
ii. Lay out all the content appropriately to form an attractive face
page.
(c) PAGE 2: Use appropriate formatting features to add a two-line text
thanking your teacher. The text should be inverted. (03 marks)
(d) PAGE 3: Type a more detailed massage of appreciation to your teacher
and format the page appropriately. Include your teacher’s name and sign
off with your name and subject combination. (03 marks)
(e) PAGE 4: At the bottom of the page in thin font, type the details of the
company which will print the card. (03 marks)
(f) Insert a header of your name and personal number on page 1 and page 4
of the card. (02 marks)
(g) Save and make a print out of your card. (02 marks)

2
3. The table below shows part of the database of employees of Bright Bottling
Company in Uganda

EMPNO NAME SEX DEPARTMENT D.O.B SALARY


P001 MUSUBIKA E F HUMAN RESOURCE 2/23/1975 800,000
P002 BAALIM M ACCOUNTS 3/17/1979 600,000
P003 MULUMBA R M COMPUTER 12/30/1987 550,000
P004 KFEERO J M ACCOUNTS 5/18/1973 450,000
P005 MUKEERA S F COMPUTER 11/24/1995 650,000
P006 NALUBWAMAA F HUMAN RESOURCE 8/17/1990 650,000
P007 NAMUWONA S F COMPUTER 3/22/1989 700,000

(a) Use a suitable database software, create a database and save it as your
name & personal number. (01 mark)
(b) Design a table named Employee table with appropriate data types in
design view, using the given information. (04 marks)
(c) Enter the data give in the table. (03 marks)
(d) Create a query with all fields to filter female employees in the computer
department and save it as computer dep. (02 marks)
(e) Create another query to calculate the ACTUAL SALARY if all
employees are registered with NSSF and 15% is deducted. Save it as
Actual Salary. (03 marks)
(f) Create a report from the Actual Salary query with all fields and save it as
Query Report.
(g) Create a form with a light background colour to show the fields EMPNO,
NAME, DEPARTMET AND SALARY. Save it as Salary Form.
(03 marks)
(h) Insert your name and personal number as the footer in the salary form.
(01 mark)
(i) Save and print all your work. (01 mark)

3 Turn Over
4. (a) Load the file Reduto using a presentation software and save it as your
name and personal number. (02 marks)
(b) Using a master slide to make all the following settings: (04 marks)
i. All titles in the presentation should be in one colour apart from
black.
ii. Insert the picture vent.JPG from the folder Images.
iii. Insert a thick line.
iv. Type your name in the footer with font size 26.
(c) Pick three picture from the folder Images and place each image on an
appropriate slide. (03 marks)
(d) i Insert a new slide with a blank layout between the title slide and
slide two. (01 mark)
ii. On the new slide, type the words WELCOME TO THE SHOW
using Word Art feature. (01 mark)
iii. Insert a picture on the slide to appear behind the words. (01 mark)
(e) i Type the benefits of Agriculture on the blank slide. (01 mark)
ii. Move the slide containing the benefits to the end of the
presentation. (01 mark)
(f) Delete the slide with the title Problems in Agriculture. (01 mark)
(g) Using the word “animals” on slide 3, link slide 3 to slide 5. (02 marks)
(h) Insert an updating data on all the slides. (01 mark)
(i) Save and print all the slides on one sheet. (02 marks)

5. (a) Using a spreadsheet application, open the file Analysis and save it as
your name and personal number. (02 marks)
(b) Enter the column titles: TOTAL, AVERAGE, POSTION and
COMMENT in the cells O2, P2, Q2, and R2 respectively. (02 marks)
(c) Use appropriate formulas to determine for each student the:
i. TOTAL mark. (02 marks)
ii. AVERAGE mark. (02 marks)
iii. POSITION. (03 marks)
iv. COMMENT. Promoted for the position 4 or below and Repeat
otherwise. (03 marks)
(d) Insert a column chart showing students total marks, include chart and
axes titles. (04 marks)
(e) Insert a header of your name and personal number. (01 mark)
(f) Save and print your work. (01 mark)
4 END
S850/2
Subsidiary ICT
PRACTICAL
Paper 2
Nov./Dec.2020
2 hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
(PRACTICAL)
Paper 2
2 hours

INSTRUCTIONS TO CANDIDATES:

This paper is made up of five equally weighted questions.

Answer any three questions.

Any additional question(s) will not be marked

Each candidate is provided with support files in the folder UNEB Support
Files on the Computer Desktop. Use the support files where applicable to
supplement the questions.
Each candidate is provided with a new blank Compact Disc (CD).

Use a permanent marker to write your name. random and personal numbers
on our CD.

Candidates should continuous save their work.

Each candidate must produce a hard copy for each question answered to
accompany the Compact Disc (CD).

© 2020 Uganda National Examinations


1 Board
Turn Over
Answer any three questions in this paper

1. (a) Using a word processing application, open the file PRODUCTION and
save it as your name and personal number. (02 marks)
(b) Copy the text and paste it to the next page. (01 mark)
(c) And a suitable title for the text and set it: (04 marks)
(i) To Times New Roman, size 26.
(ii) in Bold.
(d) Format the text in two columns. (02 marks)
(e) Insect in the document any two pictures from the Image folder.
(02 marks)
(f) Add a Drop Cap in the appropriate paragraph. (02 marks)
(g) Set the phrase “food people demand” in the first paragraph on the first
page, to link to the title on the second page. (02 marks)
(h) Insert a suitable Watermark of your choice in the document. (02 marks)
(i) Insert current date and time as the header. (02 marks)
(j) Save and print your work. (01 mark)

2. A community ICT skills workshop was organized by LUBABU Secondary


school. Certificates of Completion are to be awarded to participants who
attended the workshop for two weeks.
Using a publishing software, you are required to design the certificate of
completion.

(a) Create a layout for the Certificate and save it as your name and personal
number. (03 marks)
(b) Open the file Document and insert the text appropriately in your layout.
(06 marks)
(c) Insert appropriately any picture as a logo from the Image. (03 marks)
(d) Use relevant signatories for your certificate, period of the workshop and
venue. Place them in appropriate locations. (03 marks)
(e) Create three page border lines of 12 points each, with three different
colors. (02 marks)
(f) Insert your name and personal number in the page footer. (02 marks)
(g) Save and print your publication. (01 mark)

2
3. (a) Using a database software, load the file Test and save it as your name
and personal number. (02 marks)
(b) Change the data type of TEST ONE/30 and TEST TWO/70 to Number.
(02 marks)
(c) Modify the fields TEST ONE/30 and TEST TWO/70 as follows;
(i) Add a validation rule to limit the user from entering marks beyond
30 and 70 respectively. (02 marks)
(ii) Enter the validation text for both fields as “Beyond Maximum”.
(
(02marks)
(iii) Add appropriate description for the two fields: (02 marks)

(d) Create queries to display the following:


(i) Male students. Save it as MALE. (02 marks)

(ii) Total marks for each students. Save it as TOTAL. (02 marks)

(iii) Age of the students. Save it as AGE. (02 marks)

(e) Generate a report to display FIRST NAME, SECOND NAME,


GENDER, TEST ONE/30, TEST TEWO/70 and TOTAL. Save it as
TEST REPORT. (02 marks)
(f) Save and print your work. (02 marks)

4. (a) Using a Presentation Software, design a five a five-slide presentation


about Corruption as follows;
(i) Slide One: A suitable title and your name . (02 marks)
(ii) Slide Two: Definition of corruption. (01 mark)
(iii) Slide three: A bulleted list of forms of corruption. (03 marks)
(iv) Slide four: Ways of regulating corruption presented in two
columns. (03 marks)
(v) Slide five: Conclusion. (01 mark)
(b) Insert appropriate images in your slides. (02 marks)
(c) Insert your name and personal number as a footer to all slides. (01 mark)
(d) Apply slide transitions and animations of your choice. (02 marks)

3
Turn Over
(e) Apply a two-color background to all the slides. (01 mark)
(f) Set the slides to run automatically every 5 seconds. (01 mark)
(g) Insert automatic date and time on all the slides. (01 mark)
(h) Save the presentation as your name and personal number. (01 mark)
(i) Print your slides as a handout. (01 mark)

5. The worksheet below shows a payroll of M & C Enterprises for the month of
January, 2016.

(a) Using an appropriate spreadsheet application, enter the given data and
save it as your name and personal number. (06 marks)

In parts (b) - (d), use suitable formulas/ functions to compute:

(b) GROSS PAY which is the summation of BASIC SALARY and


WELFARE ALLOWANCE. (02marks)
(c) PAYE which is 20% of the GROSS PAY. (02 marks)
(d) NET PAY which is Gross pay minus PAYE.
(e) Represent Employee with their respective Net pay on a column graph
Place the graph on a separate sheet and rename the worksheet as GRAPH.
(04 marks)
(f) Format all the payments with a UGX currency symbol. (02 marks)
(g) Add your name and personal number as a header. (01 mark)
(h) Save and print all your work. (01mark)

END
4
S850/2
Subsidiary ICT
PRACTICAL
Paper 3
Nov./Dec.2020
2 hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
(PRACTICAL)
Paper 3
2 hours

INSTRUCTIONS TO CANDIDATES:

This paper is made up of five equally weighted questions.

Answer any three questions.

Any additional question(s) will not be marked

Each candidate is provided with support files in the folder UNEB Support
Files on the Computer Desktop. Use the support files where applicable to
supplement the questions.
Each candidate is provided with a new blank Compact Disc (CD).

Use a permanent marker to write your name. random and personal numbers
on our CD.

Candidates should continuous save their work.

Each candidate must produce a hard copy for each question answered to
accompany the Compact Disc (CD).

© 2020 Uganda National Examinations


1 Board
Turn Over
Answer any three questions in this paper

1. (a) Using a word processing application, open the file Diet and save is
your name and personal number. (02 marks)
(b) Copy the document to page two. (01mark)
(c) Add a suitable heading for the document. Double underlined it and format
it to font size 17.5. (03 marks)
(d) Insert a two-line Drop Cap on the first paragraph. (02 marks)
(e) Convert paragraph two to two columns with a line separator. (02 marks)
(f) Use a bulleted list for the major causes of overweight in paragraph three.
(02 marks)
(g) Insert page number in any format other than `1,2,3….` (02 marks)
(h) Add an appropriate image as a Watermark. (02 marks)
(i) Set all page margins to 1.4 inches. (01 mark)
(j) Add a header as the current date and time. (02 marks)
(k) Save and print your work. (01 mark)

2. (a) Using a spreadsheet application, open the file Day book and save it as
your name and personal number. (02 marks)
(b) Add the column headings: Gross Pay, Revenue Tax, Net pay and
Employee Rank. (01 mark)

For parts (c)-(f), use appropriate formulas to determine:

(c) Gross Pay which is the summation of basic pay and allowances.
(02 marks)
(d) Revenue Tax (Revenue tax is 10% of basic pay). (02 marks)
(e) Net Pay which is gross pay minus revenue tax. (02 marks)
(f) Employee Rank based on the Basic Pay. (03 marks)
(g) Insert a suitable title for the data centered across the table. (02 marks)
(h) Add All Borders to the cells containing the table. (01 mark)
(i) Draw a pie-chart showing Revenue Tax for the employees. Add a
suitable heading for the chart. (03 marks)
(j) Insert your name and personal number as a footer. (01 mark)
(k) Save and print your work. (01 mark)
2
3. Using a presentation software, create a four-slide presentation as follows:
(a) On the title slide:
(i) Give title as Computer System. (01 mark)
(ii) Type your name as the presenter. (01 mark)
(iii) Put animation as the title. (01 mark)
(iv) Insert an appropriate Clip Art of your choice. (01 mark)

Open the file called Additional and use it as specified below.

(b) On the second slide:


(i) Copy and paste PART ONE from additional. (02 marks)
(ii) Add appropriate title. (02 marks)

(c) On the third slide:


(i) Copy and paste PART TWO from additional. (02 marks)
(ii) Give an appropriate title to the slide. (01 mark)
(iii) Align the contents to the slide. (01 mark)
(iv) Insert a suitable picture from the Image folder and order it behind
the text. (02 marks)
(d) On the fourth slide, make a conclusion of the presentation. (02 marks)
(e) Change all title to uppercase and align them left. (02 marks)
(f) Save your presentation as your name and personal number. (01 mark)
(g) Print all your slides on one page. (01 mark)

4. The tables below shows bio-data of couples who are planning to wed at a
church in Uganda
HUSBANDS TABLE
HUSID HUS NAME DATE OF HUS DISTRICT AMOUNT
BIRTH
HUS001 KIGUNDU FRANK 02/7/1974 ENTEBBE 50000
HUS002 OMUUT EMMANUEL 18/7/1980 PALLISA 70000
HUS003 KIRYA MARTIN 19/19/1949 BUDAKA 90000
HUS004 ODONG ROBERT 5/8/1960 PALLISA 60000
HUS005 ISABIRYE ENOCK 11/3/1956 JINJA 40000
3 Turn Over
WIVES TABLE
WIVID HUSID WI NAME DATE OF BIRTH WI DISTRICT CONTRIBUTION
W001 HUS005 NABWIRE ROSE 19/5/1956 BUSIA
W002 HUS003 ARACH HILDA 14/2/1979 GULU
W003 HUS004 ACEN CHRISTINE 24/11/1988 OYAM
W004 HUS002 KATAIKE ALICE 26/1/1955 JINJA
W005 HUS001 NAMULI SARAH 5/4/1986 MASAKA
(a) Using appropriate software, create a database and save it as your name
and personal number. (01 mark)
(b) Design two table tables, HUSBANDS TABLE and WIVES TABLE for
the given data. Use appropriate data types. (06 marks)
(c) Populate the two tables with the data given. (04 marks)
(d) Create a one-to-one relationship between the two tables. (02 marks)
(e) Create a query displaying the following fields: HUSID , HUS NAME,
AMOUNT, WIVID and CONTRIBUTION. Compute CONTRIBUTION
which is 10% of the AMOUNT. Save the query as Contribute.
(04 marks)
(f) Create a report for the Contribute query and save it as Contribute
Report. (02 marks)
(g) Print all your work. (01 mark)
5. (a) Using a publication software, design a card of appreciation to an
employee for special services rendered to an institution as follows:
(04 marks)
(i) Create a blank page.
(ii) Change the page to landscape orientation.
(iii) Set the dimension to 8”by 8”
(iv) Set all margins to 1.1”.
(b) Insert the relevant text in the card. (04 marks)
(c) Apply Boarder Art of your choice around the card. (02 marks)
(d) Enhance your card with appropriate background, colour and text fonts
(03 marks)
(e) Insert on the card a logo of your choice. (03 marks)
(f) Type your name in a coloured font as the person to be appreciated.
(02 marks)
(g) Save your card as your name and personal number. (01 mark)
(h) Print your card. (01 mark)

4 END
S850/2
Subsidiary ICT
PRACTICAL
Paper 2
Nov./Dec.2022
2 hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
(PRACTICAL)
Paper 2
2 hours

INSTRUCTIONS TO CANDIDATES:

This paper is made up of five equally weighted questions.

Answer any three questions.

Any additional question(s) will not be marked

Each candidate is provided with support files in the folder UNEB Support
Files on the Computer Desktop. Use the support files where applicable to
supplement the questions.
Each candidate is provided with a new blank Compact Disc (CD).

Use a permanent marker to write your name. random and personal numbers
on our CD.

Candidates should continuous save their work.

Each candidate must produce a hard copy for each question answered to
accompany the Compact Disc (CD).

© 2022 Uganda National Examinations


1 Board
Turn Over
Answer any three questions in this paper

1. (a) Use a word processor of your choice to produce the following document.
Save it as your name and personal number. (05 marks)
The Media Association
P.O. Box 001, Baden
[email protected]
18/05/2022
Dear Sir/Madam.
INNOVATION EXHIBITION
The importance of innovation management is growing both in practice
and in academia. This exhibition will present, for the first time a coherent
analysis of the development of innovation and entrepreneurship.
The initiative is aimed at promoting science and technology through
project based learning in secondary schools, in an effort to illicit interest
in science and technology.
Schools will present projects depicting application of robotics in line with
theme. A school which will emerge best, is one which will have the best
presentation.
Give entrepreneurship a chance to maximize social impact.

(b) Align the address to the right. (01 mark)


(c) Drop cap the first paragraph. (02 marks)
(d) Add a watermark as your name. (02 marks)
(e) Insert your name as the writer of the document. (02 marks)
(f) Use a suitable word processing feature to post the document above to the
recipients below. (06 marks)

Title First Name Last Name E-mail Address Phone Contact


Mr. Okoth Francis [email protected] 077411224
Mrs. Baraza Mulondi [email protected] 077122663
Pastor Guma Joseph [email protected] 077517788
Imam Ali Laden [email protected] 077811223

(g) Print only the letters to Mr. Okoth Francis and Imam Ali Laden.
(02 marks)

2
2. (a) Using a spreadsheet software, load the file Produce. Save it as your
name and personal number. (02 marks)
(b) Insert a suitable heading for the data. (02 marks)
(c) Using appropriate formulas, computer per item the:
(i) TOTAL COST. (02 marks)
(ii) TOTAL SALES. (02 marks)
(iii) PROFIT. (02 marks)
(d) Add a column called %profit and compute the percentage profit without
decimal places. (03 marks)
(e) Apply thousands separator to all numeric data. (01 mark)
(f) (i) Create a Pie-Chart of ITEM and TOTAL COST. (02 marks)
(ii) Save the Pie-Chart on another sheet. (01 mark)
(iv) Include data labels in percentage on your Pie-Chart. (01 mark)
(g) Apply all border to the whole document. (01 mark)
(h) Print all your work. (01 mark)

3
3. You are required to prepare a five-slide presentation on Green Computing.
Open the file Green Computing and use the information in your slides as
follows:
(a) Slide One
(i) Include a title and the presenter’s name on the slide. (02 marks)
(ii) Format the title using Word Art. (02 marks)
(b) Slide Two
Include a bulleted list showing the goals of Green Computing.(03 marks)
(c) Slide Three
Insert the table on Power Consumption Statistics of a Laptop onto the
slide. (02 marks)
(d) Slide four
(i) Use the data in the table to generate a Chart. (02 marks)
(ii) Insert a hyperlink on Slide two , linking to Slide four. (02 marks)
(e) Slide Five
Add a conclusion to the presentation. (02 marks)
(f) Insert on any two slides, appropriate clips from the IMAGE folder.
(02 marks)
(g) Insert on each slide a Header of your name and personal number.
(01 mark)
(h) Print the slides as a handout. (02 marks)

4
4. The table below shows some members of an Inter-Religious group and their
contributions towards Soul Enrichment:
RELIG. FIRST DATE OF SEX RELIGION CONTRIBUTION
No NAME BIRTH
R002 Anne 01/02/1990 F Catholic 10000
R003 Georgina 02/23/1988 F Anglican 19000
R004 Dorcas 04/14/1987 F Adventist 300000
R005 Jane 05/11/1990 F Catholic 350000
R006 Chris 08/12/1988 M Orthodox 200000
R007 Joel 03/22/1995 M Anglican 250000
R008 Abdala 08/30/1999 M Moslem 400000

(a) Using a database management software, create a database and save it as


your name and personal number. (02 marks)
(b) Create a table with fields from the given data. Use appropriate data types
for the fields and save the table as Religious Table. (03 marks)
(c) Identify a primary key for the data. (01 mark)
(d) Design a form from the Religious Table and save it as Religious Form.
(02 marks)
(e) Use the Religious Form to enter the data. (05 marks)
(f) Create a query to return all members whose contribution exceeds 200000.
Include all the fields and name it Contribution Query. (03 marks)
(g) Generate a report from the Contribution Query. Save it as Contribution
Report. (02 marks)
(h) Insert a footer of your name and personal number on the Contribution
Report. (01 mark)
(i) Print all your work. (01 mark)

5
5. Using any Desktop Publisher. Design a Restaurant menu as follows:
(a) Open a blank A4 Landscape publication and save it as your name-
Personal number. (02 marks)
(b) Divide the page into equal portions as illustrated below. (02 marks)

FACE 1 FACE 2

(c) Add a banner at the top of FACE 1 where you will place the Restaurant
Name. (02 marks)
(d) Use word Art to add the Restaurant Name in the banner. (02 marks)
Open the file Restaurant and use the text to answer part (e).
(e) Place items for categories (i) and (ii) on FACE 1 and those for categories
(iii) and (iv) on FACE 2. (04 marks)
(f) Place on each category an appropriate picture from the IMAGE folder.
(04 marks)
(g) At the bottom of FACE 2, insert: (03 marks)
(i) The contact information of the restaurant (Two mobile phone
contacts and e-mail.)
(ii) Your name and personal number.

(h) Save and print the Restaurant Menu. (01 mark)

6
S850/2
Subsidiary ICT
PRACTICAL
Paper 3
Nov./Dec.2022
2 hours

UGANDA NATIONAL EXAMINATIONS BOARD


Uganda Advanced Certificate of Education
SUBSIDIARY ICT
(PRACTICAL)
Paper 3
2 hours

INSTRUCTIONS TO CANDIDATES:

This paper is made up of five equally weighted questions.

Answer any three questions.

Any additional question(s) will not be marked

Each candidate is provided with support files in the folder UNEB Support
Files on the Computer Desktop. Use the support files where applicable to
supplement the questions.
Each candidate is provided with a new blank Compact Disc (CD).

Use a permanent marker to write your name. random and personal numbers
on our CD.

Candidates should continuous save their work.

Each candidate must produce a hard copy for each question answered to
accompany the Compact Disc (CD).

© 2022 Uganda National Examinations


1 Board
Turn Over
Answer any three questions in this paper

1. (a) Using a word processing software of your choice, open the file Speech
and save it as your name and personal number. (02 marks)

(b) Change the following formats of the document:


(i) Font size. (01 mark)
(ii) Paragraph alignment. (01 mark)
(iii) Line spacing. (01 mark)
(c) Apply a first line indent to the document. (02 marks)
(d) Apply a light background colour of your choice to the document.
(01 mark)
(e) Insert a Drop cap on any paragraph of the document. (02 marks)
(f) Use a text box to add a suitable title for the document. (02 marks)
(g) Insert a Watermark of your choice in the document. (02 marks)
(h) Add to the document an appropriate picture from the IMAGE folder.
(02 marks)
(i) Attach a suitable Footnote to the word audience. (02 marks)
(j) Insert a footer of your name. (01 mark)
(k) Save and print the document. (01 mark)

2. (a) Using any database software, create a database and save it as your name
and personal number. (02 marks)
(b) Use the data in the file Library.xls create a table with appropriate data
types. Name the table Student Borrowing. (06 marks)
(c) Create a form that will be used to enter more records to the table Student
Borrowing. Name the form Data Entry Form. (03 marks)
(d) Design a query that will display details of students in S.3 who have
borrowed books. Name it S3 borrowers Query. (04 marks)
(e) (i) Create a report for students of S.3 who have borrowed books.
Name it S.3 borrowers Report. (03 marks)
(ii) Insert in the report a suitable picture from the IMAGE folder to
represent a logo for the school library. (01 mark)
(f) Print all your work. (01 mark)

2
3. Using any publishing software, design a certificate for a student who completed
an ICT course from a training institutions.
(a) Use a blank publication of A4 portrait to design the certificate of
completion and save it as your name and personal number. (02 marks)
(b) Adjust the paper size using the following dimensions: width 8.4 inches
and height 11.8 inches. (02 marks)
(c) Adjust the top and bottom margins to 0.3 inches. (01 mark)
(d) Adjust the left and right margins to 0.3 inches. (01 mark)
(e) Insert an appropriate logo provided in the IMAGE folder. (02 marks)
(f) Include a suitable name for the training institution. Use a font type of and
size of your choice. (02 marks)
(g) Add an appropriate title on the certificate. Format it using a Word Art.
(02 marks)
(h) Copy the text from ICT CERT and paste it on the certificate. (02 marks)
(i) Insert an appropriate picture from the IMAGE folder and order it behind
text. (02 marks)
(j) Insert an attractive border to your certificate. (01 mark)
(k) Include a background colour of your choice. (01 mark)
(l) Type your name and personal number in the footer. (01 mark)
(m) Save and print the certificate. (01 mark)

3
4. (a) Using spreadsheet software, enter the given data in a worksheet. Save it
as your name and personal number. (05 marks)

(b) Add a suitable title for the table. (01 mark)


(c) Given that;
 Tax is 10% of the Basic Pay.
 Gross Pay is the overall amount of money each employees earns.
 NSSF is 5% of the Basic Pay.
 Netpay is Gross Pay less NSSF and Tax.

Use an appropriate formula/function to compute the;

(i) Tax deducted. (02 marks)


(ii) NSSF. (02 marks)
(iii) Gross Pay for each employee. (02 marks)
(iv) Net Pay. (02 marks)
(d) (i) Draw a column chart to represent the employees’ Gross Pay.
(02 marks)
(ii) Include a title for the chart. (02 marks)
(e) Format Net Pay to UGX currency symbol. (01 mark)
(f) Insert your name and personal number as a header. (01 mark)
(g) Save and print your work. (01 mark)

4
5. You have been selected to address the youth on the topic Responsible Living.
(a) Using a suitable presentation software, prepare a five-slide presentation
with the following given in parts (i) to (v).
(i) Slide one: Title and the presenters’ name. (02 marks)
(ii) Slide two: The meaning of Responsible Living. (02 marks)
(iii) Slide three: A two column slide showing the dangers of reckless
living. (03 marks)
(iv) Slide four: Benefits of responsible living including speaker
notes. (03 marks)
(v) Slide five: Conclusion. (02 marks)
(b) Add relevant pictures from the IMAGE folder to your slides. (02 marks)
(c) Apply the transition effects to the presentation. (01 mark)
(d) Insert a blank slide between the first and the second slides and hide the
slide not to display while presenting. (02 marks)
(e) Insert slide numbers on each slide. (01 mark)
(f) Save your work as your name and personal number. (01 mark)
(g) Print your presentation. (01 mark)

5
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
s8s0/3
SUBSTDIARY ICT
Paper 3
(Practical)
Nov./Dec.2024
2 hours

UGANDA NATIONAL EXAMINATIONS BOARI)


Uganda Advanced Certificate of Education

SUB SIDIARY INFORMATION AND COMMUNICATIONS TECHNOLOGY

Paper 3
(Practical)

D 2 hours

INSTRUCTIONS TO CANDIDATES:
-
This paper consists of five questions.

Answer any three questions.

Any additional question(s) onswered will not be marked.

You are provided with support files in the folder UNEB Support Files on the
Compnter Desktop. Use the Support files where applicable to supplement the
questions.

You are provided with a new blank Compact Disc (CD).

(Jse a permanent marker to write your nome, random and personal numbers on
your CD.
You should continually save your work.

You must produce a hard copy for each of your work to accompany a soft copy on
the Compact Disc (CD).

@ 2024 Uganda National Examinations Board Turn Over


Answer any three questions in this paper.

1. (a) Use a Word Processing application to type the following document as


it appears. Save it as your name and personal number. (07 marlcs)

The banking sector has embraced the use of technology to serve its
clients faster and also to do more with less. Emerging technologies have
changed the banking industry from paper and branch-based banks to
drgrttzed and nefworked banking services. Unlike before, broadband
internet is cheap and it makes the transfer of data easy and fast.
Technology has changed the accounting and management system of all
banks. And it is now changing the way banks are dilivering services to
their customers. However, this technology comes at a cost,
implementlng all this technology has been expensive but the rewards
are limitless.

Below is the, list of some of the rores of technologv in the bankins


industrv;
* E - banking
ai. NRI banking
* Plastic money
* Self-inquiry facility
S our cefile:///C:/ Users/Student/Deskt op I J anieo/o2O L iz. htm

Finger print OCR Motrile phones C."Ait Total


"*0.

(b) Copy the document to another page. (,01 mork)


(c) Add a suitable title to the document. (02 marlrs)
(d) change the orientation of the column headings of the table. (02 martcs)
(.) Fill the last row with any paffern background. (02 marks)
(0 Apply a Drop Cap to the first paragraph. (01 mark)
(e) Format the first paragraph to fourlolumns (02 marlcs)
(h) Insert a Watermark of yotx name in the document. (02 narla)
(i) Save and print your work (01 mark)

2
2. (a) Use a spreadsheet software to open the file Accounts Ofc-Staff and
save it as your name and personal number. (02 marks)

(b) Add the following new column headings to the Staff Payroll table.
02 u*b)
0vertime Years in Development Gross Pay Net Pay
Allowance Service Allowance (Shs) (Shs)
(Shs) (Shs)

Use appropriatu furmulae in (c) to (d to compute the:

(c) Overtim€ Allowance of each employee which is Overtime Rate x


Extra days of work given that the official days of work are 20 days.
(tJse Absolute Cell Referencing). (03 marks)

(d) Number of Years in Service for each employee. (02 marks)

(e) Development Allowance for employees who have worked for more
than five years which is Excess Years x 35,000. (03 marlcs)

(0 Gross Pay of each employee which is Basic Pay + All Allowances.


(02 marl<s)

(e) Net Pay for each employee which is Gross Pay-NSSF Contribution.
(NSSF Contribution is 5% of Gross Pay). (03 marl<s)

(h) Apply All Borders on the data table. (01 mork)

(i) Incl,ude a footer of your name and personal number. (01 mark)

0) Print all your work. (01 mark)

3. (a) Using a presentation software, design a five-slide presentation about


computer storage media as follows:

(i) Slide I: Title slide showing the topic and presenter.


4c (02 marlcs)
(ii) Slide II: Abulleted list^of any five storage media. (02 marks)
(iii) Slide III: Description of any two storage media. (02 marlrs)

(iv) Slide IV: Comparison of two storage media in tabular


form. '
(03 marlrs)
(v) Slide V: Conclusion. (02 marlcs)

3 Turn Over
(b) Insert two suitable images from the IMAGE folder, on any two slides.
(02 marks)
(c) Apply slide transitions and animations to your presentati on.(02 marks)

(d) Insert slide numbers and current date. e2 marks)


(e) Include on the handout a footer of your name and personal
number.
(01 mork)
(0 Save your presentation as your name and personal number. (01 mark:1
(e) Print your presentation. eI mark)

4. (a) using a Database Management software, create a database and save it


as your name and personal number. (02 marks)

(b) Design a table with appropriate data types using the students' bio-data
provided below. Save it as STD biodata.
{04 marks)

STD ID STUDENT NAME PHONE DATE OF BIRTH AGE


MHOl APENU JULIAN 07725258 02lastr995
MHO2 OLUMU PETER 078522s8 17102t1996
MHO3 NAMIIDU ESTHER 07952461 08/03/2000
MHO4 AKIKI BASHIR 07542632 0510511999
MHO5 KAYESU COSY 07895420 16106t2001

(c) Add a caption on the PHONE field. Name it Contact. (02 marks)

(d) (i) Design a form for the table and add an appropriate title. Save it
as STD Form. ( 02 marks)

(ii) Use the form to enter the biodata. (03 marks)

(e) create a query that displays the students' age and all the other fields
for the students who were born after the year lggg. Save the query as
STD Age ( O+ ,i*t 11

(0 Generate a report for the STD Age query and save it as STD Age
Report. eimctrks)
(e) Print all your work. (01 mark)

4
s. (a) using a desktop publishing software, open a blank page in landscape
orientation. Save it as your name and personal number. (02 martcs)

(b) Insert a calendar month of January 2023 which begun on a Sunday.


, (04 marks)

Add thefollowingfeatures on the Calendar page:

(c) A company name written in Word Art. (02 marks)

(d) A company logo from the IMAGE folder. (02 marlrs)

(e) Contact and address details of the company. (02 marks)

(0 A captioned image of the company's activities from the IMAGE


folder. (02 marlcs)
(e) Apply appropriate font variations for the days, dates and month.
(03 marlcs)
(h) Group all the items on the calendar page. (02 marl<s)

(i) Save and print your work. (01 mark)

5 EI\D

You might also like