A-Level Ict Final
A-Level Ict Final
TEACHING SEQUENCE
TOPIC 8: SPREADSHEETS
o Introduction to Spreadsheets
o Microsoft Excel
A COMPUTER
A computer is a general purpose electronic machine that receives/accepts, processes stores, and output data
into meaningful information.
OR A computer is an electronic machine capable of storing vast amount of data and carry out data processing
extremely fast. A Computer is a programmable machine.
The two principle characteristics of a computer are: ▪ It responds to a specific set of instructions in a well-
defined manner. ▪
It can execute a pre-recorded list of instructions (a program). Modern computers are electronic and digital.
The actual machinery which includes wires, transistors and circuits is called hardware while the instructions
and data are called software.
A Computer is an electronic device or programmable machine, operating under the control of instructions
(software) stored in its own memory unit that can accept data (input), manipulate data (process), and produce
information (output) from the processing.
Generally, the term is used to describe a collection of devices that function together as a system.
Alternatively, a computer is a programmable device that is capable of allowing input, processing, storing and
outputting of information at a very great speed.
In very simple terms, computers are machines that process data (or information) and supply results. The
operational speed of a computer is measured in millions of instructions per second (MIPS) .
EVOLUTION OF COMPUTERS
Evolution is the gradual development of computers in terms of technology and physical size from
the 1st generation to the present generation.
COMPUTER GENERATION
Computer generation refers to the state of improvement in the development and advancement of
computer technology over years.
OR
Is series of development in technology of computers year after year.
FIRST GENERATION [1944- 1958]
In earliest general purpose computer, most input and output devices were punched cards and
magnetic tapes. They were mainly made up of loops of vacuum tubes and magnetic drum. They
could run only one program at a time.
1. They used vacuum tubes as their active element for internal operations.
2. They were large in size that is they could fill several rooms.
3. They were slow and could run one program at time.
4. They used punched cards and magnetic tapes to input and output data.
5. They used a great quantity of electricity and generated a lot of heat.
6. Programming was done in machine and assembler language.
7. They could not store much information i.e. they had limited primary memory.
8. They were expensive and terminals could be rented.
By early 1960‘s, computers were improved instead of using vacuum tubes they used transistors which
were much smaller than vacuum tubes therefore they reduced in size.
Characteristics of Second Generation Computers
In the third generation, the integrated circuits *I.Cs‘+ replaced the transistors which are small
electronic components. The IC is so effective because its components do not need to be wired
directly to computer system board. Magnetic discs were used for secondary storage and computers
began to support multi programming and time storing.
The fourth generation, Large Scale Integrated Circuits [LSIC] and Very Large Scale Integrated
Circuit [VLSIC] were developed whereby a special IC can contain a loop of up to 10,000,000 of
transistors. In 1971 Ted Hoff of Intel Company developed a micro processor which acted as CPU
(Central Processing Unit).
1. They use micro processors as their active elements e.g. 386, 486 Pentium 1,2,3,4
2. They are small in size since were made by using LSIC and VLSIC
3. They are fast and reliable.
4. They have a high primary memory.
5. They led to introduction of wide variety of software e.g. windows, Jet audio e.t.c.
6. They led to the development of inter computer communication e.g. internet (is a global system of
interconnected computer networks)
7. The price of computers dropped considerably and affordable
FIFTH GENERATION
The fifth generation is under development whereby, they will be using very large scale micro
processor circuits in a parallel architecture and highly sophisticated operating system. In this
generation, it is believed that computer will be sophisticated to extent that it may be possible to talk
to it in a human like manner.
Computers are becoming increasingly smaller, more powerful and less expensive.
However, computers are not always the answer. In some areas human being may be better than
computers.
The computer comprises of electronic elements like transistors, resistors, disorders etc, with an
internal storage or memory for storing both the instructions and data being processed while using
programs or set of instructions with specific procedure of operation to be followed. A Graphical
FIGURE SHOWING PARTS OF A TYPICAL COMPUTER SYSTEM
ACTIVITIES OR FUNCTIONS PERFORMED BY COMPUTERS
Understanding the computer as a computer system is vital to the effective use and management of
computers.
A computer system is a system of hardware devices and software components organized according
to the following system functions or basic activities which includes for instance; input, processing,
output, storage and control.
a) Input: Input into a computer may take the form of information and data provided to the
computer by a person, the environment, or another computer. The input is converted into electronic
machine readable form for direct entry or through a telecommunications network into a computer
system.
For example Input inform of words and symbols, numbers, pictures, audio signals from a
microphone, signals from another computer, temperature, speed, pressures, etc. The typical input
devices of a computer system include; sensors, keyboard, touch screens, light pens, electric mice,
optical scanners and voice input and so on.
b) Processing: Computer processing takes the format of manipulating data inputs; data are symbols
that represent facts, objects and symbols The CPU is known to be the brain of a computer
responsible for executing a given set of instructions both arithmetic (-,/,+,* etc) and logical
comparison between two or more statements plus controlling all other hardware. One of CPU‘s
major components is the arithmetic-logic unit (ALU) which performs the arithmetic and logic
functions and the control unit (CU) which controls all the processing functions and communicates
with other parts of the computer plus controlling the processing of all instructions and the
movement of data within the CPU.
c) Output: These are converted electronic information and results produced by the computer system
into human-intelligible form for presentation to end-users. Examples of output include; images on
the monitor, printed documents, sounds, signals to device controllers. Examples of output devices
include; video display, units, audio response units, printers etc.
d) Storage: Memory is the area of the computer that temporarily hold data that is awaiting to be
processed, stored or output, while storage is the area where data can be left on a permanent basis
while it is not needed for processing. Storage devices include: firstly the primary storage unit (Main
memory) and secondly, the secondary storage devices (magnetic disk and tape units, optical disks).
e) Control: The control unit of a CPU interprets computer program instructions and transmits
directions to the other components of the computer system. One of CPU‘s major components in
charge of control is the control unit (CU) which controls all the processing functions and
communicates with other parts of the computer plus controlling the processing of all instructions
and the movement of data with in the CPU
DATA AND INFORMATION
1. DATA
Data is defined as raw facts and figures that have less meaning to the end user.
Examples of raw data include;
1. Student‘s marks
2. Employee salary and wedges.
INFORMATION
1. A students report
2. Payroll for employees
Process
Collection of data
This involves capturing data from different sources such as text book, Internet, people, etc, and
recording it onto some media such as paper.
Preparation of data
This stage involves copying, grouping or arranging data in a more convenient way for input.
N.B
Checking and verifying the data collected are done at this stage.
Data verification is checking of mistakes or transmission errors when data is copied from one place to
another.
Data validation: This is the checking of input data for errors before processing.
Data validation techniques
Presence check: This is to ensure that data is actually present.
Range check/character check/alphanumeric check: This is to ensure that entered data is of correct type
like numeric or alphabetic.
Consistence check: This is to compare new data with previous data e.g. current gas meter reading
against past readings.
Control total check: This is to compare the computer calculated total like the total value of all the
invoices with the manually calculated total.
Hash total check: Is to compare the computer calculated total with the manually calculated total
Input of data
It involves entering the data or sending the stored data into the processing system. Checking the
accuracy and validity of the input data are often done at this stage.
Output of information
This stage involves giving out the processed results in a readable form or report.
Data verification
This refers to the checking of input data for errors before brought out. E.g. is it of the correct data type.
This is a room that is specially designed and prepared to facilitate the installation of computers and to
provide a safe conducive environment for teaching and learning of computer studies.
Why must there be safety rules and precautions in the computer laboratory?
- To avoid accidental injuries to the users.
- To avoid damage of computers.
- To avoid lack of a conducive teaching-learning environment.
Speed
Computers are very fast in their operations in that their speed in measured in millions of instructions
per second (MIPS)
Accuracy
Computers are known to be so accurate that they hardly make any mistake. In fact computers are
capable of detecting and correcting wrong mistakes made. It follows therefore that if wrong data is
fed into the computer, wrong results are expected out. Hence the saying, ―garbage in garbage out‖
(GIGO)
Storage
For a computer to be able to work, it must have some
work space where data is stored before being processed or where information is stored before being
output to particular devices. This storage space is called memory.
Diligence
Computers have the ability to perform the same task over and over without getting bored or tired.
This is seen in industrial robotics, like in car assembly lines.
Artificial Intelligence
Computers are artificially intelligent. They can respond to requests given to them and provide
solutions. This is accomplished by the power of the programs installed in them.
Note:
1. Installation is the term used to refer to the act of adding or improving a program on your computer
2. A computer program is a set of instructions written in computer language e.g. Microsoft word,
Microsoft excel, Microsoft Power point, Microsoft Access, Microsoft Publisher, Note pad, Word pad
etc.
Automation
Computers work automatically. They do not need any supervision in order to perform programmed
routines.
Multitasking
Computers have the ability of handling different types of tasks at the same time. i.e. a user can
instruct it to print, scan for viruses, play music, search for the lost file, to mention but a few. All the
above activities can be done at the same time or even more. Hence the term multitasking.
Connectivity
If computers are joined together i.e. interconnected using a given network media, then connectivity
becomes another characteristic. This is aimed at sharing resources such as files, printers, programs,
disk drives, etc.
COMPUTER CLASSIFICATIONS
Computing devices fall into various classes. The basic computer classifications include;
1. Classification by purpose 3. Classification by size
2. Classification by process 4. Classification by processor power
Classification by purpose
Here computers are classified according to the work they are designed for. This classification is
further divided into two sub-classes i.e.
Special purpose computers General purpose computers
Classification by process
1.6: Categories of Computers
Computers can be categorized according to the process they use to represent data. People
communicate through speech by combining words into sentences. Human speech is analog because it
uses continuous (wave form) signals that vary in strength and quality. Most Computers are Digital.
Computers can generally be grouped under three (3) categories i.e.
a) Analog Computers
b) Digital Computers
c) Hybrid Computers
a) Analog Computers
An analog Computer is a computing device that uses continuously changing values to represent
information.
These computers that represent data or information as continuous variable quantities or Units! It
generally deals with physical variables such as temperatures, weight, voltage, pressure, speed, etc.
b) Digital Computers
Digital Computers are those, which represent data or information as numerical (binary) digits.
These are computers that use discrete (discontinuous) values, i.e. binary digits (0, 1) to represent data.
Data entered is represented as a series of 0,s and 1‘s, also kwon as binary notation or base two and is
handled by micro processors.
The binary digits simply mean the presence or absence of an electric pulse or voltage. The state of
being ON is represented by 1 and OFF is represented by 0.
Although digital representations are discrete, the information represented can be either discontinuous,
such as numbers, and letters, or continuous such as sounds, images, and other measurements of
continuous systems.
Digital computers are more accurate and work at a very fast rate.
Here general purpose computers are classified according to how data processed is presented. This
classification is further divided into 3 sub-classes i.e.
Digital computers Analog computers Hybrid computers
Digital computers
These are computers that process data that is presented in form of discrete values, i.e. discrete values
are numbers that can be defined like 1, 2, 3, 4, 5, etc. digital watches are an example
Analog computers
These are computers that process data that is in a continuous form or measurable quantities/units e.g.
pressure, temperature, electrical voltage are variable quantities. Examples of analog computers
include those used in applications like thermometers, voltmeters and speedometers.
Hybrid computers
These computers have the combined features of both digital and analog computers i.e. they deal with
analog signals and digital signals at the same time.
Note:
The transfer of digital signals to analog signals is called modulation and analog to digital is called
demodulation hence the term ―Modem‖.
Classification by size
Here hybrid computers are classified depending or according to the user capacity and size of the
machine. This classification is further classified into 3 sub-classes or categories i.e.
Super computers Mini frame computers
Mainframe computers Microcomputers/Personal computers
Supercomputer
An extremely fast computer, which can perform hundreds of millions of instructions per second
Main Frame
These are very large computers normally owned by the state and process data at high speed. Multi-
user computer system capable of supporting hundreds of users simultaneously. Software technology is
different from minicomputer.
Laptop computers
These are computers that are smaller than desktop computers and are designed for
mobile computing. They have all the facilities and system resources offered by desktop
computers
Palmtop computers
These are smaller than laptop computers. They are designed for those people who are
ever on the move. Like the laptops, palmtops have all the facilities and the system
resources offered by desktop computers
CHAPTER TWO
COMPUTER HARDWARE
o Categories of computer hardware
o Application of different hardware components
DEFINITION OF HARDWARE
Hardware: This refers to the physical or tangible components of a computer system.
Hardware can be physically seen by our naked eyes.
Hardware can be divided into five main types:
• Input hardware
• Processing hardware.
• Output hardware
• Storage hardware.
• Communication hardware.
DEFINITION OF INPUT DEVICES
• Input devices are used to enter data/commands/instructions in a form that the
computer can use.
• They send the data or commands to the processing unit.
• They can be used to capture data to be entered into the computer
Illustration of different hardware
INPUT HARDWARE
Different data types entered into a computer system:
• Text data
• Images/graphics
• Videos
• Audio
According to the type of data they input, they can be grouped into the following :
a) Text input devices
b) Pointing input Devices
c) Imaging input Devices
d) Gaming input Devices
e) Audio input Devices
f) Biometric input Devices and
g) Other Specialized input devices
KEYBOARD
Definition: It is a primary text input device on a computer.
It consist of the following sections.
Typewriter Area (A-Z)
Numeric key pad (0-9)
The Functional Keys (F1-F12)
Arrow keys or Cursor movement key
FUNCTIONS OF A KEYBOARD:
• It is used to enter data into a computer, its keys allow the user to type data in form of
text or numbers
• Can be used to command the computer to perform an operation using the keyboard
shortcuts, such as ctrl + s for saving data/information et
• It is a major connector or interface between the computer and the user without which
the user commands will not be put in a language the computer understands.
Distinguish Between A Special Key And A Modifier Key On A Computer Keyboard
• Modifier key: Is a special key on a computer keyboard that changes the normal action
of another key when the two are pressed in combination. For example, <Alt> + <F4>
in Microsoft Windows will automatically close the program in an active window.
• Whereas a special key is a unique key on a computer keyboard that independently
performs a specific function/operations; caps lock
MODIFIER KEYS
Alt key:-
• The Alt-key combines with other keys to perform specific functions.
• In most window programs, the main menu Tabs have got underscored letters e.g. File,
Edit, View, Format, Tool, Table, Window and Help.
• Pressing Alt with the underlined letter will activate that menu.
• Alt + F4 = Exits a program.
Control (ctrl) key.
• Used with other keys to perform specific functions/operations e.g.
• Ctrl + F2 = Print preview, Ctrl + Alt - Adds a new page (Page Beak)
• Ctrl + Alt + F2 = gives ‗Open file dialogue box‘.,
• Ctrl + Alt + Del = Initiates a reboot (warm boot)
• Ctrl + P = initiate print dialog box ,Ctrl + B = bolds a selection
• Ctrl + S = saves a file
• Ctrl + V = Paste, Ctrl + W = New file, Ctrl + X = Cut.
• Ctrl + Esc = Activates the startup menu.Etc
Shift Key.
• Makes one alternate between lower and upper case characters during routine
typesetting operations. It is also used for other short cut operations e.g.
• Shift + F3 = Alternates between lower and upper case characters, title case and
sentence case.
• Shift + Arrows = used to select text.
• Shift while inserting a CD-ROM to deactivate the auto-run.
SPECIAL KEYS
• Windows key: Activates the start-up menu for the computer user to run shutdown,
Run, Help, Search, Settings, Documents, programs, Control panel, etc.
• Enter key/Return:
• Used to confirm commands or move the cursor/insertion point to a new line.
• Tab key:
• In normal typesetting, tab keys help in having data in columns with smooth margins.
And also for indentation
• When working with tables it is used to move from field to field, and to add a
field/Row in a table.
• When the cursor is in the last bottom cell of the table, pressing tab key adds another
row.
• Shift + Tab take you back to the previous field.
• Space bar:
Is a key on an alphanumeric keyboard in the form of a horizontal bar in the
lower - most row, significantly wider than
Creates gaps between characters and words during typing
• Caps lock:
Is a key on a computer keyboard. Pressing it causes the keyboard to go into a
mode in which letter keys are interpreted as capital letters by default . The caps lock
does not affect the number or punctuation keys.
• Escape (ESC) key = used to Exit/close a dialog box.
• Insert = for overtyping.
• Delete key = erases one character at a time on the right of the cursor.
• Back space key = deletes one character at a time on the left of the
cursor.
• Num lock key. = Activates the numeric keypad.
• Print screen key = for printing what is on the computer screen.
Scroll Lock key = for scroll lock. Disabled in modern keyboards
CURSOR CONTROL KEYS
• Home = Moves the cursor at the beginning of a line.
• End = Moves the cursor to the end of a line.
• Page up = Moves the cursor to the top of the page.
• Page down = Moves the cursor to the bottom of a page.
FUNCTIONAL KEY:
POINTING DEVICES
A pointing device is any computer hardware component (specifically human interface
device) that allows a user to input spatial (ie, continuous and multi-dimensional) data to a
computer. Mostly by Computer Aided Design (CAD)systems and graphical user interfaces
(GUI) and activating switches on the mouse. Movements of the pointing device are echoed
on the screen by movements of the pointer (or cursor) and other visual changes
A COMPUTER MOUSE
FUNCTIONS OF A MOUSE.
• The mouse is used as a pointer to move to, or select a particular section of
the displayed window.
• It is used to complement the keyboard especially in a graphical interface
environment
• Its right button provides an array of time saving shortcut menus.
CORDLESS MOUSE/WIRELESS MOUSE
OPERATIONS OF A MOUSE
• Clicking. It is an act of pressing and releasing the left hand button of
the mouse once.
• Right clicking. It is an act of pressing and releasing the right mouse
button once.
• Double clicking. Is the act of pressing a computer mouse twice
quickly without moving the mouse
• Dragging. Is an act of pointing at an item, then hold down the left
mouse button as you move the mouse.
• Scrolling. It is an act of navigating the window page up or down by
moving the wheel like button.
• Dropping. This refers to the
LIGHT PEN
A light pen is a handheld pen like pointing device that has a light
sensitive point to select options on the screen.
JOYSTICK
• A joystick is a pointing device with a vertical lever mounted on a base to
control the position of the cursor.
TRACKBALL
• A trackball is a stationary pointing device with a ball mechanism on its
top.
TOUCH SCREEN
• A touch screen is an input device that permits the entering or selecting of
commands and data by touching the surface of a sensitized video display
device with a finger or a pointer.
TOUCH PAD
• A touch pad is a small flat rectangular pointing device that is sensitive to
pressure and motion.
STYLUS AND A DIGITAL PEN
Looks like a ballpoint pen, but uses pressure to write text
and draw lines
FLAT-BED SCANNER
• A flatbed scanner works like a copy machine except that it creates a file of the document rather than a paper
copy.
SHEET FEED SCANNER
• A sheet feed scanner has motorized rollers that can feed the source document across the scanning head
during the scanning process.
HANDHELD SCANNER
• A handheld scanner can be manually passed over the image to be scanned.
DIGITAL CAMERA
• A digital camera is an image input device that takes video or still photographs, or both, and records them on a
light-sensitive sensor.
MICROFILM CAMERA
WEB CAMERA
• web cam is a digital video camera. It can be directly connected to a computer. It usually takes a digital picture
at regular intervals and uploads the picture to an Internet website. Web cams are used for teleconferencing.
Users communicate with each other using microphones and speakers as well as web cams to see each other on
their monitors.
CLOSED CIRCUIT TELEVISION (CCTV)
CCTV, or closed-circuit television, is a system that allows you to keep an eye on what‘s going on in and around
your business. Cameras and monitors enable you to view events live, and recorders archive footage for later
reference
MAGNETIC INK CHARACTER RECOGNITION READER (MICR)
• It is an image input device that reads Characters printed using special magnetic ink, which contains iron oxide. i.e.
The Bank Cheque Number, the Branch Sort Code and the Account Number are printed in magnetic ink at the
bottom. As the document passes into the M.I.C.R. reader, the ink is magnetized, so that the shapes of the characters
can be recognized electronically. The characters have to be printed in a special font style. The main use of MICR is
to input data from bank Cheque.
QR CODE READER
• Abbreviated from Quick Response Code) is the trademark for a type of two-dimensional bar codes in which
information is represented by black and white dots (so-called "square data dots" or "data pixels"). It looks as
below:
• To read information off a QR code, a QR code reader is used on smart phones, android phones or by modern
bar code readers.
QR Codes can contain more than just a simple link to a website: Use them to link to a video, your Face book
profile or an MP3 file—anything a modern Smartphone is capable of doing. Directly take your visitors to the
relevant content, without the bother of typing in complicated URLs.
CYBER GLOVE
• It is an input device for virtual reality environments. Various sensor technologies are used to capture physical
data such as bending of fingers. Often a motion tracker, such as a magnetic tracking device or inertia tracking
device, is attached to capture the global position / rotation data of the glove. These movements are then
interpreted by the software that accompanies the glove, so any one movement can mean any number of
things. Gestures can then be categorized into useful information, such as to recognize Sign Language or other
symbolic functions.
• Magnetic Strip Card Readers
• virtual reality: a computer-generated environment with scenes and objects that appear to be real, making
the user feel they are immersed in their surroundings.
• Exposure to a magnet or magnetic field can erase the information and contents of a card's magnetic stripe.
BIOMETRIC INPUT DEVICES
• A biometric device translates a biological personal characteristic into a digital code that is stored or compared
with a digital code stored in the computer.
• Common biometric devices include:
• Fingerprint scanner
• Face Recognition systems
• Hand geometry systems
• Signature verification systems
• Iris Recognition systems
A FINGERPRINT SCANNER
• A fingerprint scanner captures curves and indentations of a fingerprint. Some grocery and retail stores now
use fingerprint readers as a means of payment, where the customer's fingerprint is linked to an account or
credit card.
GAMEPAD
• A gamepad controls the movement and actions of players or objects in video games or computer games. On
the gamepad, users press buttons with their thumbs or move sticks in various directions to trigger events.
Gamepads communicate with a game console or a personal computer via wired or wireless technology.
AUDIO INPUT DEVICES
• Midi instruments:
Refers to normal musical instruments which have a midi port for input into a midi interface in the computer. The
music can then be stored as a file, displayed on screen and edited ready for playback
SOUND CARD
• A sound card is a device that can be slotted into a computer to allow the use of audio components for
multimedia applications. Without a sound card, Audio input and output is not possible.
MICROPHONE
Is the input device used (in conjunction with software such as "sound recorder") to turn sound waves into
digital files that a computer can understand
PROCESSING DEVICES
Processing devices are the computer electronic components and chips housed in the system unit. They are used to
interpret, manipulate, convert, translate and transform input data into information. Therefore, a processing device
handles the intermediate stage in the computer.
• Power supply
• Expansion cards
• Expansion slots
• ROM-BIOS
• Diodes
• Capacitors
INSIDE THE SYSTEM UNIT
Power supply
Central processing unit
CD-R
CD-ROM/DVD-ROM
PORTS
Hard Disk Drive
Hard
Expansion Card
RAM
Expansion slots
The components attached to the motherboard include the processor chip (the CPU), memory chips, support electronic circuitry, buses, and Expansion
Slots for Adapter Cards
Motherboard
• Built into the power supply is a fan that keeps the power supply cool. Processor chips generate heat, which could cause the chip to burn up.
• A heat sink is a small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components
such as a processor.
HEAT SINK
POWER SUPPLY
FANS
FANS
THE CENTRAL PROCESSING UNIT
Central Processing Unit (CPU), or sometimes just called processor/ Microprocessor
It acts as the brain of the computer system. It reads and interprets software instructions and
coordinates the processing activities that must take place.
It refers to a very large scale integrated circuit technology that incorporate the computer memory,
logic and control circuits on a single
Out put
REGISTERS
In put CU ALU
• The control unit retrieves one instruction at a time from a stored program.
• It interprets the instruction and sends signals to the ALU directing it to execute the instruction.
• it communicates with the input devices in order to transfer program instructions and data into storage.
• The control unit also communicates with the output device to transfer results from storage to the output devices
• The arithmetic operations it handles are addition, subtraction, multiplication and division. The logic operations it
handles are comparisons such as greater than, less than and equal to, true or false
REGISTERS
• Is a small amount of storage available on the CPU whose contents can be accessed more quickly and directly.
• Registers are high-speed working storage areas that temporarily hold instructions and data.
• Registers work under the direction of the control unit to accept, hold, and transfer instruction or data and
comparisons at high speed.
• Registers are not part of Memory or Secondary Storage: Registers hold data immediately related to the operation
being executed. Memory is used to store data that will be used in the near future. Secondary storage holds data that
may be needed later (in future)
Types of registers
• Instruction register, which contains the instruction being executed;
• Address register, which keeps track of where a given instruction or piece of data is stored in memory;
• Storage register, which temporarily holds data taken from or about to be sent to memory;
Cache memory
• A CPU cache is a high speed memory used by the central processing unit of a computer to reduce the average time to
access memory.
• The cache is a smaller, faster memory which stores copies of the data from the most frequently used main memory
locations.
What is a machine cycle?
• It refers to the stages of data processing with in the C.P.U.
Step 1. Fetch
Obtain program instruction
or data item from memory
Memory
Step 2. Decode
Step 4. Store Translate instruction
into commands
Write result to memory
Processor
Control Unit
ALU Step 3. Execute
Carry out command
• 2) Decoding—the process of translating the instruction into commands that the computer understands.
• Functions of Buses
• Data sharing - the expansion bus must be able to transfer data between the computer and the peripherals connected
to it.
• Addressing - A bus has address lines, which match those of the processor. This allows data to be sent to or from
specific memory locations.
• Power - A bus supplies power to various peripherals that are connected to it.
Timing - The bus provides a system clock signal to co-ordinate the peripherals attached to it with the rest of the
system
• PnP refers to the computer’s capability to automatically configure adapter cards and other peripherals as you install
them when the computer is still running.
Ports
• A port is the point at which a peripheral attaches the system unit. Through a port, the peripheral can send data to or
receive information from the computer.
• A peripheral device, such as a keyboard, monitor, printer, mouse, digital camera, and microphone, often attaches by a
cable to a port on the system unit.
• A serial port is a type of interface that connects a device to the system unit by transmitting data one bit at a time. It usually used
to connect devices that do not required fast data transmission rates, such as a mouse or keyboard.
• Parallel ports allow the parallel transmission of data; that is, several bits are transmitted simultaneously. These ports provide the
interface for such devices as high-speed printers.
• USB (Universal Serial Bus) ports are used in high-speed device interfaces.
• Bluetooth ports use radio waves to transmit data between two devices, without using cables.
Connectors
• A connector joins a cable to a port. A connector at one end of a cable attaches to a port on the system unit, and a
connector at the other end of the cable attaches to a port on the peripheral. Most connectors are available in one of
two genders: male and female.
• Female connectors have matching holes to accept the pins on a male connector.
Expansion slots and Adapter cards
• An expansion slot is a socket on the motherboard that can hold an adapter card .An adapter card, also called
expansion card, is a circuit board that increases the capabilities of the system or provides connections to peripherals.
Some motherboards include all necessary capabilities and do not require adapter cards. Adapter cards are used for
many supplemental capabilities, such as more memory, higher-quality sound devices, a modem, extra ports, or
graphics capabilities.
EXPANSION CARDS
Commonly used adapter cards and their functions
Adapter Card Purpose
CMOS
• Complementary Metal-Oxide Semiconductor (CMOS) technology provides high speeds and consumes little power.
• CMOS technology uses battery power to retain information even when the power to the computer is off.
• Battery-backed CMOS memory chips, for example, can keep the calendar, date, and time current even when the
computer is off.
PRIMARY MEMORY
• Primary storage (also called main storage, main memory, or internal storage) holds all instructions and data needed
for processing
• It consists of:
• It is the main working memory of the computer i.e. the higher the RAM the better the personal computer.
CHARACTERISTICS OF RAM
• It is volatile and therefore loses its contents when the computer is switched off.
• Static RAM (SRAM) is faster and more reliable than any form of DRAM. The term static refers to the fact that it does
not have to be re-energized as often as DRAM.
• Magneto resistive RAM (MRAM), stores data using magnetic charges instead of electrical charges.
• MRAM has greater storage capacity, consumes less power, and has faster access times.
• Virtual RAM (VRAM): Modern operating systems can use spare storage space on the hard disk as if it is working
memory and this is referred to as Virtual memory or Virtual RAM
• The instructions in Rom are stored permanently; the computer can read or follow instructions in Rom but cannot
change them.
• Cannot write and thus called read only. A good example of Rom is BIOS which performs the POST (power on self test),
which initializes the computer when power is turned on.
• CHARACTERISTICS OF ROM
• It is non-volatile, meaning it does not lose contents when power is switched off.
RAM ROM
2. Contents lost when power goes off 2. Contents remain when power goes off
Memory size
• When data are entered into a computer through a device such as a keyboard, they are not in a form that the
computer can interpret, computers cannot understand the complex symbols that humans use. They recognize only a
code composed of 0s and 1s, known as machine language. Machine language suits the computer because electronic
components and storage media represent two states: on/off, conducting/non-conducting, or present/absent.
• Binary representation
• Data representation in a computer is in binary number system. Which has only two digits 0s and 1s. The computer
interprets the digit 0 as “off” and 1 as “on”. Each 1 or 0 is called a bit, which is short for Binary digit. A bit is the
smallest unit of data a computer can handle.
• A single bit, a 0 or a 1, cannot represent a number or a letter, but by using combinations of the two digits, computer
scientists have developed codes that represent characters (letters, numbers, and other symbols)
Summary;
1 Character = 8 bits
1 byte = 8 bits
1 Kilobyte = 1024 bytes
1 Megabyte = 1024 kilobytes
1 Gigabyte = 1024 Megabytes
1 Terabyte = 1024 Gigabytes
Example2
Example1.
Convert 128byte to Megabytes Solution
Convert 128bytes to kilobytes
Solution
1,000,000 Bytes = 1 Megabyte
1
1kilobyte (KB) = 1000bytes Therefore; 1byte = MB
1 1000000
Therefore; 1byte = KB 1
1000
128bytes = x 128 MB
1000000
1
128bytes = x 128 KB
100
= 0.000128MB
128
128bytes = KB
Therefore 128bytes = 0.000128 MB
100
= 1.28KB
How many bytes are in name NUSIFAH? Convert 0.000127 MB to bytes (KB)
Solution
Solution
1 Megabyte = 1,000,000
From; 1 character = 8 bits Bytes
Ba Num Remin
se ber der
2 128 0
2 64 0
2 32 0
2 16 0
2 8 0
2 4 0
2 2 0
1
Solution
= 128 + 0 + 0 + 0 + 0 + 0 + 0 + 0
= 128ten
CONVERTING BINARY BASE TO ANY BASE LIKE BASE FOUR
Example 1
Here you have to convert the binary base to decimal base then to a desired base in this case base four
= 128 + 0 + 0 + 0 + 0 + 0 + 0 + 0
= 128ten
Ba Num Remin
se ber der
4 128 0
4 32 0
4 8 0
2
128ten = 2000four
Computer Storage
• Computer Storage refers to the ability of a computer to keep data or information.
• Temporary storage
• permanent storage
Temporary storage
• This is the ability of a computer to store data or information for a short time as long as the computer is still
on
Permanent storage
• This is the ability of a computer to store data or information on a permanent computer storage medium.
• Primary memory can’t store our data and programs permanently we therefore use several
secondary storage media such as compact disks (CDs), floppy disks, magnetic tapes etc.
Definition of Terminologies
• A Storage medium is the physical material on which a computer keeps data. There is a variety of storage
media available.
• A Storage Device reads and writes data to and from a storage medium.
• Reading is the process in which a storage device transfers data, from a storage medium into memory.
• Writing is the process in which a storage device transfers data from memory to a storage medium (saving).
• Access time, is a measure of the amount of time it takes a storage device to locate an item on a storage
medium.
• Transfer rate is the speed with which data, instructions, and information move to and from a device.
Transfer rates for storage are stated in Kbps (kilobytes per second).
COMPUTER STORAGE
• Magnetic tape is a magnetically coated ribbon of plastic capable of storing large amounts of data
and information at a low cost. Tape storage requires sequential access, i.e. data must be accessed in
the order in which it is stored. If the computer is to read data from the middle of a tape, all the tape
before the desired piece of data must be passed over consecutively. Today, magnetic tape storage is
no longer used for routine processing.
• Very slow, as need to wind tape (perhaps a long way) to find any specific position .
HARD DISK DRIVE
• A hard disk is a principal mass storage medium in a computer system that stores data magnetically.
• Made of stronger thick non-flexible disk material (aluminum)or (ceramic)coated with magnetic
materials and fixed permanently together with its drive mechanism inside the computer. Data is
stored magnetically. Spinning at the required speed all the time it is very much faster to access than
a floppy disk or CD-ROM (faster than 1 MB per second). Can hold thousands of megabytes
(gigabytes) of data. Used for storing all programs and work files for very fast access by the
computer.
• Characteristics
– They store mass volumes of programs and data thus increases the productivity of a computer
• They are faster in loading or retrieving data and programs than other forms of secondary storage.
MAGNETIC HARD DISK
SOLID STATE
• Solid state storage (SSS)/flash memory: is a type of computer storage media that is made from
silicon microchips. SSS stores data electronically instead of magnetically
• Flash memory stores the binary data of zeros and ones, but it does so with electrons that shuttle
through the device's circuitry instead of magnetic poles on a disk. Because electrons store the data,
the devices have no moving mechanical parts. This allows the drives to consume less power than
traditional magnetic drives and to retrieve data faster.
SOLID STATE HARD DISK (SSD)
• Stands for "Solid State Drive." An SSD is a type of mass storage device similar to a hard disk
drive (HDD). It supports reading and writing data and maintains stored data in a permanent state
even without power. Internal SSDs connect to a computer like a hard drive, using
standard IDE or SATA connections.
• While SSDs serve the same function as hard drives, their internal components are much different.
Unlike hard drives, SSDs do not have any moving parts (which is why they are called solid
state drives). Instead of storing data on magnetic platters, SSDs store data using flash memory.
Since SSDs have no moving parts, they don't have to "spin up" while in a sleep state and they don't
need to move a drive head to different parts of the drive to access data. Therefore, SSDs can access
data faster than HDDs.
M.2 SSD
• An M.2 SSD is a small form factor solid-state drive (SSD) that is used in internally mounted storage
expansion cards. M.2 SSDs conform to a computer industry specification and are designed to enable
high-performance storage in thin, power-constrained devices, such as ultra-book laptops and tablet
computers. They are generally smaller than other comparable SSDs, such as the mini Serial
Advanced Technology Attachment (mSATA)
SMART CARD
Smart Card: Contains a processing microchip to provide it with intelligence as well as memory it is really
a tiny computer, eg. the SIM card used in a mobile phone identifies you through a PIN number, identifies
and connects to your service provider and provides a menu of options, as well as storing phone numbers
and phone settings.
A smart card, which is similar in size to a credit card or ATM card, stores data on a thin microprocessor
embedded in the card.
An intelligent smart card contains a CPU and has input, process, output and storage capabilities
A MEMORY CARD
• A memory card has only storage capabilities.
• Applications of smart cards include
• Storing a prepaid dollar amount (e.g., a prepaid telephone calling card).
• Storing patient records and other health-care information.
• Tracking information of customers and employees.
• Flash memory cards are a type of solid-state media, which means they consist entirely of electronic
components and contain no moving parts. Common types of flash memory cards include;
CompactFlash (CF), SmartMedia, miscroSD, miniSD, xD, Picture Card, etc.
CD-RW
(compact disc-rewritable)
• A CD-RW (compact disc-rewritable) is an erasable multisession disc that you can write on multiple
times.
• Reliability of the disc tends to drop, however, with each successive rewrite.
• To write on a CD-RW, you must have a CD-RW drive and CD-RW software.
• A CD-RW drive has a lower read and write speed as compared to CD-Rs
Stands for "Digital Versatile Disc Recordable." A DVD-R looks the same as a regular DVD, but like a
CD-R, it can be used to record data. Once a DVD-R has been "burned," or written to, it cannot be written
to again. A basic single-sided, single-layer DVD-R disc can store 4.7GB of data. Double-layer discs can
store 8.5GB, while double-sided DVD-Rs can store 9.4GB.
DVD-R is the most common format of writable DVDs (compared to the DVD+R and DVD-RAM formats).
Most DVD players and DVD-ROM drives can read DVD-R discs. That means you can use a DVD-R disc
to back up several gigabytes of data on your computer or make your own video DVD. The Apple
SuperDrive used in many Macintosh computers supports the DVD-R format.
DVD-ROM
• A DVD-ROM (Digital Video Disc-ROM) is an extremely high capacity compact disc capable of
storing from 4.7 GB to 17 GB.
• A DVD-ROM drive or DVD player is required to read a DVD-ROM.
• Although the size and shape of a DVD-ROM and a CD-ROM are similar, a DVD-ROM uses one of
the following three storage techniques to increase its storage capacity
• The first technique involves making the disc more dense by packing the pits closer together.
• A second technique involves using two layers of pits, which doubles the capacity of the disc.
• Finally, some DVD-ROMs are double-sided, which means that they can be removed and turned
over to read the other side.
•
DVD-RW
• Stands for "Digital Versatile Disk Rewritable." A DVD-RW is like a DVD-R but can be erased and
written to again. Like CD-RWs, DVD-RWs must be erased in order for new data to be added.
DVD-RWs can hold 4.7GB of data and do not come in double-layered or double-sided versions like
DVD-Rs do. Because of their large capacity and ability to be used multiple times, DVD-RW discs
are a great solution for frequent backups. To record data onto a DVD-RW disc, you'll need a DVD
burner that supports the DVD-RW format
Blu-ray
PHOTOGRAPHIC FILM
Photographic film is a sheet of plastic such as polyester coated with a light sensitive emulsion that is used
to record and store photographs. Normal film is shipped in small canisters (boxes) that protect it from the
light. When exposed to light, it forms an invisible image. Chemical processes can then be applied to the
film to create a visible image, in a process called film developing. A normal photographic film can hold up
to 40 pictures.
OUTPUT DEVICES
• And out put device Refers to any peripheral that conveys /displays(presents)(produces) information
from the computer, to the user.
• Output is data that has been processed into a useful form called information. Computers generate
several types of output, depending on the hardware and software being used and the requirements of
the user.
(vi)LED displays .
Types of monitors
• Cathode ray tube monitors (CRT)
• Liquid Crystal Display (flat panel)
• Plasma screen
• Touch screen
• Organic Light Emitting Display (OLED
CRT MONITORS
• A CRT (cathode ray tube) monitor is a desktop screen that contains a large sealed glass cathode-ray
tube.
• Inside the CRT, an electron beam moves back and forth across the back of the screen.
• This causes dots on the front of the screen to glow, producing an image on the screen.
• Each dot consists of a red, a green, and a blue phosphor, which combine to make up a pixel.
A pixel is a single point in an electronic image
CRT MONITORS
Advantages
• Can produce fast and rich color output
• Images can be viewed from a wide angle
• It is cheaper than LCD monitor
Disadvantages
• It emits higher electromagnetic radiations that cause eye defects
• It consume a lot of power than the LCD
FLAT-PANEL DISPLAYS
• A flat-panel display is a lightweight display device with a shallow depth and flat screen that
typically uses LCD (liquid crystal display) or gas plasma technology.
• Examples of flat -panel displays include LCD monitors, and plasma monitors.
• Many are widescreen, ie much wider than they are tall.
• Screens are measured diagonally from one corner to the other. Common sizes are 17‖, 19‖, 20‖,
22‖, 24‖ and 27‖, 45‖ and 65 inch screens
LCD MONITORS
PLASMA SCREENS
TOUCH SCREENS
Disadvantages
• It is more expensive than the CRT
• Images are viewed from a narrow angel
TERMS
Resolution
• is the number of horizontal and vertical pixels in a display device. It refers to the sharpness and
clearness of an image
• The higher the resolution the better the image
• Often expressed in dots per inch (dpi)
Pixel
• It is a single point in an electronic image
Refresh rate
• Is the speed that the monitor redraws images on the screen, it is measured in hertz
PROJECTORS
There are two common types of projectors: DLP (digital light processing), and LCD (liquid crystal
display). In the early days of projectors, CRT (cathode ray tube)projectors were commonly used
DLP PROJECTOR
DLP stands for 'Digital Light Processing' and is a technology invented by Texas Instruments. The picture
in a DLP projector is produced by light reflecting off a Chip which has millions of tiny mirrors fixed on
it. This chip is commonly known as a 'Digital Micro mirror Device' or DMD. Each mirror in the DLP
projector's DMD Chip represents one pixel in the digital image, so for example, in a HD DLP DMD chip
there will be 1920x1080 or a little more than 2 million mirrors assembled on the tiny DLP DMD Chip.
LCD PROJECTOR
An LCD projector is a type of video projector for displaying video, images or computer data on a screen or
other flat surface. It is a modern equivalent of the slide projector or overhead projector
HEADGEAR
LED DISPLAYS
A LED display is a flat panel display, which uses light-emitting diodes as a video
display.
A LED panel may be a small display, or a component of a larger display.
They are typically used outdoors in store signs and billboards.
PRINTERS
• A printer is an output device that produces a hard copy output such as text and graphics on a
physical medium like paper.
• Printed information (hard copy) exists physically and in a more permanent form than a soft copy
on a display device.
• Printers with different speeds, features, quality, and capabilities are available in a range of
prices.Printers can be grouped into two categories: impact and non-impact printers.
IMPACT PRINTERS
• An impact printer forms characters and graphics on a piece of paper by a striking mechanism
against an ink ribbon that physically contacts the paper.
• Impact printers are noisy because of this striking activity.
• Large Businesses, use impact printers because these printers can withstand dusty environments,
vibrations, and extreme temperatures.
Commonly used types of impact printers include Daisy wheel, dot-matrix , Braille and line printers
DAISYWHEEL PRINTER
• This is a kind of impact printer where characters are arranged on the ends of the spokes of a
wheel.
• The wheel (usually made of plastic) is rotated to select the character to print and then an
electrically operated hammer bends the selected spoke forward slightly, squeezing in an ink ribbon
between the character and the paper, as in a typewriter.
• One advantage of this arrangement over that of a typewriter is that different wheels may be
inserted to produce different typefaces (font styles and sizes)
DOT-MATRIX PRINTER
• A dot-matrix printer produces printed images when tiny wire pints on a print head mechanism
strike an inked ribbon like in a type writer.
• When the ribbon presses against the paper, it creates dots that form characters and
graphics.Most dot-matrix printers use continuous-form paper, in which thousands of sheets of
paper are connected together end to end. The papers have holes along the sides to help feed the
paper through the printer. Dot matrix printers provide cheap but low quality printing.
BRAILLE PRINTERS
• A Braille printer, commonly known as a Braille embosser, is an impact printer, that renders text
as tangible dot cells which are felt and read by the blind.
• Using Braille translation software, a document can be embossed with relative ease and
efficiency.
• They need special Braille paper which is thicker and more expensive than normal paper.
• Once a copy produced, printing further copies is often quicker by means of a device called a
"thermoform", which produces copies on soft plastic.
LINE PRINTERS
• A line printer is a high-speed impact printer that prints an entire line at a time.
• The speed of a line printer is measured by the number of lines per minute (lpm) it can print.
• Some line printers print as many as 3,000 lpm.
• Mainframes, servers, or networked applications, such as manufacturing, distribution, or shipping,
often use line printers.
NON-IMPACT PRINTERS
A nonimpact printer forms characters and graphics on a piece of paper without actually striking the
paper.
Some spray ink, while others use heat or pressure to create images.
Commonly used nonimpact printers are ink-jet printers, laser printers, thermal printers, plotters, and
mobile printers
INK-JET PRINTER
• An ink-jet printer forms characters and graphics by spraying tiny drops of liquid ink onto a piece
of paper.
• Ink-jet printers produce text and graphics in both black-and-white and color on a variety of
paper types & sizes.
• The print head mechanism in an ink-jet printer contains ink-filled print cartridges.
• Each cartridge has very many small ink holes, or nozzles.
• The ink propels through a combination of the holes to form a character or image on the paper.
LASER PRINTER
• A laser printer is a high-speed, high quality nonimpact printer.
• Operating in a manner similar to a copy machine, a laser printer creates images using a laser
beam and powdered ink, called toner, which is packaged in a cartridge.
• When printing a document, laser printers process and store the entire page before they actually
print it. For this reason, laser printers sometimes are called page printers.
• Storing a page before printing requires the laser printer to have a certain amount of inbuilt
memory.
THERMAL PRINTERS
• A thermal printer generates images by pushing heated pins against a coated heat-sensitive
paper.
• The coating turns black in the areas where it is heated, producing an image.
• Basic thermal printers are cheap, but the print quality is low and the images tend to fade over
time.
• Thermal printing technology is, however, ideal for use in small devices e.g. ATM receipt printers.
PLOTTERS
• Plotters are printers used to produce large, high-quality, vector graphic drawings such as
blueprints, maps, posters, and signs.
• These printers are usually very costly, and are used in specialized fields such as engineering, and
graphic art.
• They use ink-jet printer technology, on a much larger scale, to print professional quality displays.
MOBILE PRINTERS
• A mobile printer is a small, lightweight, battery powered printer that allows a mobile user to print
from a notebook computer, Tablet PC, PDA, smart phone or other personal mobile device while
traveling.
• They fit easily in a briefcase alongside a notebook computer.
• Mobile printers mainly use ink-jet, thermal, wax-transfer, or dye-sublimation technology.
3D PRINTERS
• A 3D printer is a type of material design printer that designs and builds 3D models and products of
devices and components using an additive manufacturing process.
• 3D printers design three-dimensional prototypes and create the end product by directly building
them using computer aided design (CAD) or software-created 3D design diagrams, figures and
patterns.
LED PRINTER
• An electro-photographic printer that uses a matrix of LEDs as its light source. The LED mechanism
is much simpler than its laser printer counterpart. A stationary array of LEDs is used instead of
numerous moving parts, and the LEDs are selectively beamed onto the drum
DYE SUBLIMATION PRINTERS
• Dye sublimation is a printing process using a specially designed ribbon that holds solid inks. The
printer heats the ink, causing it to sublimate – which means it skips the liquid form and transitions
directly into a gaseous state
COMPUTER SOFTWARE
o Introduction to software
o System software
o Application software
SOFTWARE
Software is a collection of computer programs and related data that provides the instructions for telling
the computer what to do and when to do it. OR
This refers to a set of programs that controls the operations of the computer and its devices. It serves as
the interface between the user, the application software and hardware. They provide the facilities that
enhance the computer‘s general performance.
CATEGORIES OF SOFTWARE
Software is often divided into two categories:
1. Systems software: Includes the operating system and all the utilities that enable the computer to
function.
2. Application software: Includes programs that do specific work for users. For example word
processors, spreadsheets, and database management systems fall under the categories of applications
software,
Types of software
Software can be categorized in two (2) types:
System Software
Application software
System Software
System Software is computer software designed to operate the computer hardware and to
provide a platform for running application software and hardware.
The system software is installed on your computer when you install your operating system.
These programs are written by the computer manufacturers or professional programmers. Some of these
programs reside inside ROM are known as firmware. System software consists of:
1 .Operating System
2.Programming languages
3. Utility programs
COMPUTER SOFTWARE
Multi-user
It allows multiple users to log on to the system at ago. Examples are UNIX and LINUX. It allows users
to access the same data at the same time. It is tised in networking. Each person on the network appears
to be a sole user of the computer by allocating each user on a network at a time and when the time
elapses, the next person is given a go ahead.
Multi-tasking
This allows the computer to do more than one job at the same time. There is no time lag between the
different tasks e.g. One can type a document as he is printing at the same time.
Networked
This is an operating system that contains components and programs that allow a computer on a network
o serve requests from other computers for data and provide access to other resources such as printer and
file systems. Examples are Ms-windows 2000 server, Ms Windows 2003 server, UNIX and LINUX.
Standalone
Stand alone are usually not connected to a network and thus cannot access resources. Examples of
operating systems include; Disk Operating System (DOS), UNIX. Windows like windows 95,98.2000,
2003, XP, Vista.
NB:
The operating system commonly used on micro computers are; Ms [ and windows.
DOS i s a command driven user interface which has been described by many as not being a user
friendly program. It has a set of programs which help one to work with a computer effectively, merge
the information on the external storage device and carry out all housekeeping routines. It is used to
manage devices, command processing, control programs and manages system resources and errors.
Examples of DOS include Personal Computer Disk Operating System (PC-DOS) and Microsoft Disk
Operating System (MS-DOS).
Windows is a GUI (Graphical User Interface) operating system .it combines a number features e.g. It is
easy to make programs, easy to use. Its main aim is reliability and manageability with the help of active
directory Common examples include windows 2000.
USER INTERFACES
When a computer is turned on, an interface is seen. This consists of the cursor, menus, icons etc. that
allow users to do things with the computer. A user interface can make a computer either easy or hard to
use.
In the designing of a user interface, sound, colors, graphics, position of items on the screen and
availability of help are considered.
Types of interfaces
1. Command Line Interface (CLI)
These accept commands in the form of special words or letters. The user types keywords or presses
special keys on the keyboard to enter data and instructions, It provides a virtually empty screen with
blinking cursor (prompt) where commands are keyed in and the computer executes them on pressing the
enter key.
The commands are accepted and executed by a part of the operating system called the command
processor or command line interpreter. Command line software is more flexible but more difficult to
learn. Users must have knowledge of the available commands, what they do and the rules governing
how they should be typed. It is more suited for experienced users. Examples include: DOS, UNIX,
LINUX
2. Menu driven
There are many different menu forms that provide the user with a list of program commands displayed
on the screen and a simple means of selecting between them. It presents the user with a choice and does
not need one to remember the commands. It is suitable for beginners and infrequent users.
Components of GUI
Pointer: Is a symbol that appears on the display screen that is moved to select objects and commands. It
usually appears like a small angled arrow. A pointing device is a device such as a mouse that enables
the user to select objects on the display screen.
Icons: These are small pictures which represent commands, files or windows. A command can be
executed or turned into a window by moving the pointer to the icon and pressing the mouse button.
Window: Is a visual area containing a user interface that displays output and allows input to one or
more processes. The screen can be divided into different areas running different programs or displaying
a different file. Windows can be moved around the display screen and their shape and size at will.
Desktop: This is the area on the display screen where icons are grouped.
Menus: This is a program‘s list of user choices or possible actions usually shown on the screen. These
help in execution of commands by selecting a choice from the menu
PROGRAMMING LANGUAGES
This refers to the means of communicating with the processor or Programming languages are medium
used by man to write instructions that command the computer hardware to perform certain tasks. They
involve definition of a list of words and symbols according to a particular predetermined rule of
grammar (syntax) into a logical manner to form a computer program.
MACHINE CODE
This is a low level language in which systems of impartibly instructions ara executed directly by a
computers CPU. Each instruction performs a very special task. This s a first generation language and
unfamiliar to humans it is not user-friendly at all. All instructions in machine code are represented in
the binary format e.g. 100100100010001 on a 16 bit machine. Machine code language is highly
efficient and allows direct control of each operation though it is difficult to read and debug, tedious,
time consuming, error prone and designed for a specific machine and microprocessor.
ASSEMBLY CODE
Assembly languages have the same structure and set of commands as machine
languages, but they enable a programmer to use names instead of numbers.
This is a low level language in which each statement corresponds to a single machine language
instruction. They are always specific to certain computer architecture and allow the use of systematic
representation of machine codes. This was invented to assist machine code programmers. It is more
easily understood and remembered by humans e.g. SUB for subtract. FNO for first number. It has a
closer control over the hardware and executes efficiently but it is designed for a specific machine and
microprocessor.
Low level languages are closer to the hardware than are high level languages which are closerto
humans.
Advantages
The language is widely used
It is machine independent
Its English-like statements are easy to understand
It can handle many files
It has a pool of skilled programmers
It can easily handle input/output operations
It is portable
Disadvantages
Its structure makes even simple programs long
Since it is readable, it is wordy
It cannot handle mathematical processing
LANGUAGE PROCESSORS
A language processor is a hardware device designed or used to process program code to machine code.
Language processors are mainly used with high level programming to work backwards to the processor.
Their main work is to translate high-level language codes into low-level language codes that the
processor can understand.
A translator on the other hand is a program that accepts text expressed in one language pd generates
semantically equivalent text expressed in another language.
Language processors include: Compilers, assemblers, interpreters and Linkers
Compilers
These translate a program written in high level language into machine code or into assembly code
program. The entire program is translated into machine code at compilation time. They do the
following:
• Allocate areas of main storage.
• Generates the object program on cards, tapes, or disc as required.
• Produces a print listing of the source and object programs when required.
• Tabulates a list of errors found during compilation e g the use of Words or statements not included in
the language vocabulary.
Assemblers
An assembly is a program that translates assembly language/instructions into binary code or machine
code, a format that is understood by the processor. They normal begin from where compilers stop. They
do the following:
Assemblers allocate areas of storage.
Detects and indicates invalid sources-language instructions
Produces the object program on cards, tapes, or disc as required
Produces a print listing of the source and object projects with comments
Data may be added to tell which program may be executed when the assembly process is completed
This program can only be executed when the assembly process is completed
Translates mnemonic operation codes into machine code, and symbolic addresses into machine code
Interpreter
An interpreter translates high level instructions into an intermediate form which it then executes. The
source program is translated line by line while the program is running. As a result, a program running
under an interpreter runs very slowly as compared to a compiled program.
It does not need to go through the compilation stage, the interpreter immediately executes high level
programs and thus it is faster.
Linkers
These programs combine compiled programs and determine where the program will be located in
memory. When the linker has transformed an object code, an executable file is generated. This normally
results in files with the extension.
UTILITIES
A utility is a program that performs a specific task related to the management of computer functions,
resources or files like virus protection, memory management, password protection and file
compression. Utilities are also called service programs and they are used to enhance the performance of
the operating system. These programs are part of system software used to support, enhance and expand
existing programs in a computer system and make‘ it more and more user friendly. The most common
utilities include:
i. Debuggers: are used during the testing of programs and locating errors.
ii. Sorting utility: used for sorting data.
iii. Editors: for making changes, used for word processing.
iv. Resource: used in networks
v. Disk scanner utility: detects and corrects both physical and non-logical problems on storage devices.
vi. Disk defragmenter: it recognizes the files whose contents are broken and spread across several
locations on the hard disk and moves fragments to one location for efficiency.
vii. File compression utility: shrinks the size of the file which takes up less storage space. Compressed
files are sometimes called zipped files with a .zip extension.
viii. Cryptographic utilities: encrypt and decrypt streams and files.
ix. Spy ware remover: detects and deletes spy ware. Spy ware is a program placed on a computer to
secretly collect information without the user‘s knowledge.
x. Internet filters: remove or block certain items from being displayed.
xi. Merge utility: for merging or combining different files into one.
xii. A personal firewall: detects and protects a personal computer from unauthorized intrusions.
xiii. An installer utility: removes an application as well as any associated entries in the file system.
xiv. A backup utility: it allows a user to copy or back up selected files on to another storage disk.
xv. Data recovery utility: recovers accidental deleted files from your computer.
xvi. An antivirus utility: It prevents, detects and removes viruses from a computer memory or storage
device.
xvii. Screen saver utility: is a utility that causes the monitor‘s screen to display a moving image or
blank screen if no keyboard or mouse activity occurs for a specified period of time.
Screen savers were originally developed to prevent a problem called ghosting, in which images could
be permanently etched on a monitor‘s screen.
Screen savers can be used for reasons of security, prevent unwanted onlookers from accessing data or
information from your computer, for advertisements on the screen, for entertainment and also prevent
burn in.
APPLICATION SOFTWARE
Application software refers to related programs designed to perform a specific task to
solve a particular problem for the user. They are designed to solve practical problems
experienced in life.
Application package
This is a user software program designed to accomplish a given task.
Characteristics
Targeted to wide range of users
Easy to use-user friendly
Designed for power and flexibility
Machine independent
Software suite
This refers to the collection of individual applications sold as a single package.
Application is software that enables a computer to perform a specific task or carry out a specific job.
The job is called an application. These programs make a computer perform different activities like or
uses like word processing, accounting, and graphics etc. They are called application programs because
they direct the processing required for the particular task of the computer. They include: word
processing, spreadsheets, databases, presentations, desktop publishing, graphics processing and
communication software.
Application software needs a particular hardware and operating system for their application. It is
divided into two categories:
Packaged/Off-the-shelf software/standardized/commercial/market-
available/pre-built/third-party
This is an application program which is copyrighted and designed to meet needs of a wide variety of
users. These are of general nature and solve needs which are common in nature.
They are already made programs designed to suite any environment and are bought from the shops and
then installed in a computer.
2. Freeware
This is copyrighted software provided at no cost to users e.g. games like solitaire and Dave, antivirus
software like
AVG.
3. Shareware
This is copyrighted software distributed free for the trial period and payment is required for continued
use after the trial period e.g. Motorbikes, computer car driving simulations, VS NET, antivirus software
like MacAfee.
Word processing
Word processing software also known as a word processor is used to create, edit, format , save, and
print documents that contains text and graphics.
Others include;
MultiMate Professional writer Word star
Perfect writer Word perfect
Editing
This is the process of making changes to the existing content of the document.
Formatting;
Formatting involves changing the appearance of a document. There are four different levels of
formatting;
Character formatting Section formatting
Paragraph formatting Document formatting (formatting page)
Character formatting;
Involves changing the font type, font size or font style. The most common way to emphasize text is to
apply bold face, italic or underline character forming styles.
Paragraph formatting;
This involves text alignment, lines spacing, indentation s, tab settings, and borders.
A paragraph can be a single line of text or an entire page, and may be formatted independently from the
rest of the document.
Section formatting;
This lets you specify page numbers, headers and footers for different sections or computers of a
document.
Undo;
This one allows actions that have been performed to be reversed such that if some text was accidently
deleted, then the action can be undone.
Saving;
This is the process of copying a document from the memory to a storage medium such as floppy disk or
hard disk.
NOTE:
Any document can be saved and exist as a new file, which is a named as collection of data, instructions
or information.
Printing;
This is the process of sending a file to a printer to generate output on a medium such as a paper.
Popular features of word processing software includes (characteristics)
Word wrap;
This is the term used to describe a situation where the cursor automatically jumps to the next line. It
allows a user to type continually without pressing the enter key at the end of each line.
Replace;
This feature allows the user to substitute existing characteristics, word, or phrases with new ones.
Spelling checker;
This allows the user to check the spelling of a whole document at one time or to check and even correct
the spelling of individual words as they are typed (ie Auto correct)
Grammar checker;
Reports grammatical errors and suggest ways to correct them.
Thesaurus;
This suggests alternative words with same meaning (ie synonyms for use in the documents).
Mail merge;
Create form letters, mailing labels, and envelopes‘. Used when similar letters have to be sent to several
people. The names and addresses of each person can be merged with one single document and then
printed out.
Macros;
Allows a user to record or save frequently used key strokes and instructions, which can be executed
later by running the corresponding macros.
Multi-columns;
This arranges text in two or more columns that look similar to a newspaper or magazine.
Template;
Allows a user to create documents, which are frequently used.
Printing ;
Allows a user to print single or multiple copies, fully or part of a document.
PRESENTATION SOFTWARE
This is an application program that allows users to create a variety of visually appealing slides that are
used to help further communication ideas. OR
It is an application software that enables users to create computer – based slide shows using
sophisticated graphics and animations to enhance images.
A presentation is the collection of slides handouts, speakers note and outlines in a single file.
These applications are also able to create slide shows are normally employed during meetings or
seminars to enhance speakers or presenters‘ ideas graphically.
Presentation software (sometimes called "presentation graphics") is a category of application programs
that are used to create visual presentations. These presentations are usually delivered in a slide show
format, and can be created with a variety of programs. The programs make it possible to combine text
and graphic elements to convey important information to a group of people all at once.
Each presentation software allows users to develop a slide show presentation; however, the methods for
viewing the presentation may vary from program to program. Both the PowerPoint® presentation
software and the Impress programs allow for the presentation to be viewed full screen on a computer
monitor, where the presenter can either have slide changes timed, or click through them. The
presentation can be moved to a larger screen by connecting the monitor to another screen.
Handouts:
A handout consists of two to six slide images on a single page. Handouts help to support your
presentation by keeping the audience focused on what you are saying.
Outline:
For brain storming and organizing your thoughts. The text of your presentation i.e. headings and main
body text appears without the slide‘s background, colours and graphics.
Transitional looping:
It is a facility which sets up the presentation to run continuously until is stopped by the presenter.
Templates:
A template is a pre – designed presentation that defines what your presentation will look like, where
text and other objects will appear and which foreground and background colours will be used.
Auto features.
These features make it easier for you to perform your work e.g. the auto clip art command.
Wizards.
Power point employs many wizards which make short order of the tasks that might otherwise be
repetitive, time consuming or difficult.
Place holders
These are boxes with dotted borders that one part of most slide layouts.
These boxes hold title and body text or objects such as charts, tables and pictures.
Action buttons:
These are buttons that is used in presentation software as hyperlinks to navigate the presentation.
Multimedia:
Refers to audio, video, charts, pictures that are used in slide presentation.
NB:
Slide mode of printing involves:
Printing each slide on its separate page while handout mode of printing, lets you print your desired
number of slides on one page.
Note:
Power point starts running on your screen once you click on it, with a title slide as the default slide
layout. But one can easily change to any other layout depending on the question.
Types of views in Microsoft Power Point provide different layouts for constructing and viewing your
presentation. These include;
- Normal view - Outline view - Slide show view
- Slide view - Slide sorter view - Notes pages view
Normal view;
Here the screen is split into three sections, showing presentation outline on the left, the active slide in
the main window and the notes at the button.
Slide view:
The slide view displays each slide on a screen and is helpful for adding images, formatting text and
adding background styles.
Outline view;
The presentation outline is displayed on the majority of the screen with small windows for the slide and
notes. This enables one to edit and display all presentations text in one location instead of one slide at a
time.
ii. Timing;
Refers to the technique by which slides or text appear on screen during a presentation. (Mouse click or
automatic)
Slide layout.
This is a given design of slide showing divisions or areas or sections of a slide where work can be done.
Examples of layouts in Ms. Power Point presentation software such as Microsoft power point provides
a number of slide designs that one can use to come up with him or her presentation. These include;
- Title slide - Comparison - Blank
- Title and content/bulleted list - Title only - Content with caption.
- Two content/two column - Section header - Picture with caption.
Disadvantages
It is difficult for the audience to take notes while the presentation is taking place, otherwise they lose
concentration
Audiences are often happy to sit placidly and not interact with the presenter
Not good for presenting certain kinds of information such as complex math equations
It is all too easy to make a very bad presentation with too many animation effects and too much text,
images
Presenters often just read from the presentation which is boring for the audience.
Spreadsheet Terms
Like all other areas of computer technology, Microsoft Excel worksheets have their own "language."
This list of common terms is provided to serve as a reference for you as you work in Excel.
Cell
The intersection of a column and row. Information is stored in cells.
Cell Pointer
The cell pointer is similar to Word's insertion point. It selects or marks the current cell (where the next
activity is going to take place). The Excel pointer changes shape depending on location and
corresponding function. For more information, refer to Pointer Shapes above.
Cell References
The address, consisting of the column and row IDs, of a specific cell. The current cell location is
displayed in the upper left corner of the worksheet.
Column
A vertical group of cells within a worksheet.
Formula
A set of instructions which perform a calculation based on numbers entered in the cell or numbers
entered in other cells (referred to by cell references). All formulas begin with the equal sign (=).
Function
A pre-programmed formula. The function performs the calculation based on the cells referenced in the
function. All functions begin with the equal sign (=).
Range
A group of cells. Ranges are often referenced for formulas, printing, and designating information to be
copied or cut. Ranges can be selected by clicking and dragging over the cells.
Row
A horizontal group of cells within a worksheet.
Value
A number that can be used in an Excel calculation.
Workbook
A collection of worksheets contained within a single file.
Worksheet
A single layer or single sheet within the workbook. A worksheet can contain data, charts, or both.
Instead of compiling all of your information into one worksheet, you can create several worksheets
within the one workbook file. With this organization, similar information is grouped together to make it
easier to locate and use. The worksheets for your workbook will vary based on its content and purpose.
EXAMPLE: If you want one file containing the grade books for all sections you teach, each section can
be on a separate sheet.
NOTE:
The terms worksheet and spreadsheet are often used interchangeably.
Error values
Microsoft excel displays an error value in a cell when it cannot calculate the formula for that cell
Error values Meaning
#Div/0! The formula is trying to divide by zero (0)
#N/A! No value is available
#Name? Microsoft excel does not recognize a name used in the
formula
#Null! You specified an intersection of two areas that don‘t intersect
Num! There is a problem with the number
#REF! The formula refers to a cell that is not valid
#VALUE! An argument or operator is on the wrong type
Database Functions
There are several functions that a DBMS performs to ensure data integrity and consistency of data in
the database. These include the following;
Data dictionary management
Data transformation and presentation
Security management
Multiuser access management
Data integrity management
Database access languages and application programming interface
Backup and recovery management
Database communication interfaces,
Transaction management
Data storage management.
MS. ACCESS
MS. Access is one of the most common database programs on market. Ms. Access which comes as part
of MS. Office first appeared as Ms.access 2.0. With the up grading of various applications programs
Ms. Access was up graded to Ms. Access 97, Ms. Access 2000, MS. Access XP, MS. Access 2007, MS.
Access 2010 and MS. Access 2013.
Data base:
This is a collection of related information stored for a particular purpose. The data in the data base is
arranged in column and rows.
Field:
This is the entire column that contains similar data items. e.g. the names column in the table above
contains each individual name.
Record:
It is asset of the entire data items in the row. In other words a record is a collection of different fields in
particular table .e.g. . If you are to consider the data item in the second row in the table above this
contains all the information concerning Richard.
Field Name:
A field name is a file of particular column (field) e.g. sex, District, Names, and allowances are field
names.
Field Properties:
A field property is a characteristic of a particular field. The field properties are normally specified
from the general tab of the data table structure.
This specifies the specific, data item stored i.e. field can either be text, Number, Date/time, currency,
Auto number, OLE object, hyper link.
Data Tables:
There are the fundamental structures in Ms. Access data base.
Queries:
These are tools used to manipulate data in t5he data tables i.e. they do operation tasks like how many
people are male and live in Kampala.
Macros:
This is an automated procedure of action in a computer. It is also called a main program because it has
short automated procedures which consist of simple commands.
Modules:
These are Microsoft access objects that enable the users to work processes. Just like macros they
provide work process von the specific commands.
Unlike macros, modules need one to have a good back ground in the programming languages and
preferably in Ms. Visual BASIC.
REPORT:
These are tools in access that enables one to preview and print data in a meaning full format.
Forms:
These are tools in MS. Access that enables one to enter and display records from the data base tables
registration forms, data words, receipts.
Foreign Key
This is a field in a relational database record that points to a key field in another table or a column in a
table that match the primary key in another table within the same data store.
Primary Key
This is a feature in database programs that uniquely identify a record. In other words,
Flat Database
This is one that only contains a single table of data. In other words, all of the data in database is stored
in this one place.
Relational Database
A relational database is one that contains two or more tables of data, connected by links called
relationships.
Advantages
Reduced data redundancy
Reduced updating errors and increased consistency
Greater data integrity and independence from applications programs
Improved data access to users through use of host and query languages
Improved data security
Reduced data entry, storage, and retrieval costs
Facilitated development of new applications program
Disadvantages
Database systems are complex, difficult, and time-consuming to design
Substantial hardware and software start-up costs
Damage to database affects virtually all applications programs
Extensive conversion costs in moving form a file-based system to a database system
Initial training required for all programmers and users
RELATIONAL DATABASE MANAGEMENT SYSTEM:
A RDMS is a type of software that enables one to create manipulate and query a data base. i.e. a
program that enables you to manage data. These programs enable the user to store large amount of data
that can be easily retrieved and processed with great flexibility to produce meaningful managements
report.
Database Functions
There are several functions that a DBMS performs to ensure data integrity and consistency of data in
the database. These include the following;
Data dictionary management
Data transformation and presentation
Security management
Multiuser access management
Data integrity management
Database access languages and application programming interface
Backup and recovery management
Database communication interfaces,
Transaction management
Data storage management.
MS. ACCESS
MS. Access is one of the most common database programs on market. Ms. Access which comes as part
of MS. Office first appeared as Ms.access 2.0. With the up grading of various applications programs
Ms. Access was up graded to Ms. Access 97, Ms. Access 2000, MS. Access XP, MS. Access 2007, MS.
Access 2010 and MS. Access 2013.
Data base:
This is a collection of related information stored for a particular purpose. The data in the data base is
arranged in column and rows.
Field:
This is the entire column that contains similar data items. e.g. the names column in the table above
contains each individual name.
Record:
It is asset of the entire data items in the row. In other words a record is a collection of different fields in
particular table .e.g. . If you are to consider the data item in the second row in the table above this
contains all the information concerning Richard.
Field Name:
A field name is a file of particular column (field) e.g. sex, District, Names, and allowances are field
names.
Field Properties:
A field property is a characteristic of a particular field. The field properties are normally specified
from the general tab of the data table structure.
This specifies the specific, data item stored i.e. field can either be text, Number, Date/time, currency,
Auto number, OLE object, hyper link.
Data Tables:
There are the fundamental structures in Ms. Access data base.
Queries:
These are tools used to manipulate data in t5he data tables i.e. they do operation tasks like how many
people are male and live in Kampala.
Macros:
This is an automated procedure of action in a computer. It is also called a main program because it has
short automated procedures which consist of simple commands.
Modules:
These are Microsoft access objects that enable the users to work processes. Just like macros they
provide work process von the specific commands.
Unlike macros, modules need one to have a good back ground in the programming languages and
preferably in Ms. Visual BASIC.
REPORT:
These are tools in access that enables one to preview and print data in a meaning full format.
Forms:
These are tools in MS. Access that enables one to enter and display records from the data base tables
registration forms, data words, receipts.
Foreign Key
This is a field in a relational database record that points to a key field in another table or a column in a
table that match the primary key in another table within the same data store.
Primary Key
This is a feature in database programs that uniquely identify a record. In other words,
Flat Database
This is one that only contains a single table of data. In other words, all of the data in database is stored
in this one place.
Relational Database
A relational database is one that contains two or more tables of data, connected by links called
relationships.
Disadvantages
Database systems are complex, difficult, and time-consuming to design
Substantial hardware and software start-up costs
Damage to database affects virtually all applications programs
Extensive conversion costs in moving form a file-based system to a database system
Initial training required for all programmers and users
Physical securityrisks.
A computer physical security risk refers to a threat or potential danger to the physical componets
of a computer systemnetwork infrastructure, or related hardware.
Some of the potential physical security risks include;
1. Hardware Theft:
Description: this is stealing of computers, servers, or other hardware
components.
2. Hardware Vandalism:
Description: this is the deliberate destruction of computer equipment either by
internal or external individuals.
3. Environmental Hazards:
Description: Risks posed by environmental factors, such as floods, earthquakes,
or other natural disasters that can damage or destroy computer equipment.
4. Power Failures or Fluctuations:
Description: Risks related to power supply issues, including power outages,
surges, or fluctuations that can damage hardware components or lead to data loss.
5. Fire Outbreaks:
Description: Uncontrolled fires can pose a serious threat to the physical
infrastructure of computer systems, including servers, data centers, and other
hardware components.
Cyber Crimes
Cybercrime, or computer crime, refers to criminal activities that are carried out using computers,
networks, and the internet.
Examples of common cybercrimes include;
Hacking
Phishing
Electronic
fraud
Cyber
bullying
Cyber
Espionage
Cyber
extortion
Intellectual property (IP)
Intellectual property (IP) refers to creations of the mind—ideas, inventions, artistic works,
designs, symbols, names, and images.
Intellectual Property Rights (IPR) are legal rights granted to individuals or entities to
protect their intellectual creations or inventions.
ICT ETHICS
Ict ethics are moral guidelines that govern the use of computers.
Computer ethics involves the use of computers in a morally acceptable way.
Some of the most common computer ethics include;
o Contribute to society and human well being
o Always avoid harm of others
o Always be honest and trustworthy
o Always exercise fairness and don‘t be discriminative
o Honor intellectual property rights
o Respect other individual‘s privacy
o Honor confidentiality
Code of conduct
A code of conduct is a written guideline that determines whether a particular action is ethical
or unethical.
Sample code of conduct includes;
1. Computers shall not be used to harm other people
2. Users shall not interfere with another person‘s work
3. Computers shall not be used to steal
4. Computers shall not be used to bear false witness
5. Users shall not copy software illegally
6. Users shall not use another individual‘s computer without permission
7. A user shall consider the social impact of the programs they design
8. Users should use computers in a way that demonstrates consideration and respect to
other people.
DATA COMMUNICATION AND NETWORKING SUMMARY
NETWORKING HARDWARE
These are all computers, peripherals and communication devices that enable one or
more computers to exchange items like data, instructions and information with each
other.
These include:
1. Network bridge
A network bridge is a network device that connects a local area network to another local
area network that uses the same protocol.
Page 1
Note LAN stands for Local Area Network and WAN stands for Wide Area Network
2. Router
It is also a networking device that forwards data packets between computer networks.
Page 2
Illustration of how a router works
Page 3
Illustrations of how wired and wireless network interface cards are used
How a wired network interface card is used
Page 4
Illustration of how a network switch works
Page 5
6. A repeater
7. Gateway
Gateway connects two or more networks that can be of different types and provides
protocol conversion so that end devices with different protocol architectures can
interconnect.
8. Firewalls
Page 6
A firewall is a piece of hardware or software put on the network to prevent some
communications forbidden by the network policy.
9. Modems
A modem is device used to acquire an Internet connection from the ISP (Internet Service
Provider) to end user.
Page 7
TOOLS THAT FACILITATE IN NETWORKING
Networking tool kit
A networking tool kit is tailored for complete computer and network maintenance and
troubleshooting.
1. Crimping tool.
A crimping tool is a device used to affix a connector to the end of a networking cable.
Page 8
3.A wire stripper/wire cutter. A wire stripper or wire cutter is a small hand-held device
that is used to remove the insulation from the wire.
Unshielded twisted-pair (UTP). It has no metal shielding around the twisted-pair wire,
hence greatly affected by noise.
Page 9
2. Coaxial cable
A coaxial cable consists of a single copper wire surrounded by three layers which
include an insulating material, a woven or braided metal and a plastic outer coating.
3. Fiber-optic cable
A fiber-optic cable is made of glass or plastic and transmits signals in the form of light.
Page 10
NETWORK ARCHITECTURES/MODELS
Network architecture refers to the design of computers, devices, and media in a
network.
1. Client/server network model
Network Topologies
A topology is the physical arrangement of the devices in a communications network.
Network topologies include:
1. Star Topology
Page 11
2. Bus topology
In a bus network, each computer or device is connected to a common central line
known as the bus or the backbone.
Server computer
Bus/Backbone
printer
3. Ring Topology
printer
4. Mesh Topology
In a mesh topology, every
device has a dedicated point-
to-point link to every other
device.
Page 12
5. Tree/hierarchical topology
A tree network has a central line connecting together a series of star networks.
Server computer
printer
printer
Bus/Backbone
Workstations
Page 13
3. Full duplex Mode
Simplex mode
In this type of transmission mode, data can be sent only in one direction i.e.
communication is unidirectional. We cannot send a message back to the sender.
Unidirectional communication is done in Simplex Systems where we just need to send a
command/signal, and do not expect any response back.
Examples of simplex Mode are loudspeakers, television broadcasting, television and
remote, keyboard and monitor etc.
Page 14
Example of Full Duplex is a Telephone Network in which there is communication
between two persons by a telephone line, using which both can talk and listen at the
same time.
In full duplex system there can be two lines one for sending the data and the other for
receiving data.
END
Page 15
Candidate’s Name: Random No. Personal
………………………………………………………. No.
Signature ……………………………………………
(Do not write your school/Center Name or Number anywhere on this booklet.)
S850/1
Subsidiary Information
and Communication
Technology
Paper 1
Nov/Dec.2013
2 ⁄ hours
INSTRUCTIONS TO CANDIDATES:
Answer all questions in this paper
All answers should be written in blue or black ink in the spaces provided in the
question paper.
1
Answer all the questions in this paper.
………………………………………………………………………………
(b) State two reasons to defend your answer in(a) (02 marks)
(i)……………………………………………………………………………
………………………………………………………………………………
(ii)……………………………………………………………………………
………………………………………………………………………………
(c) Which is the least important of the computer specifications given in the
table? (01 mark)
………………………………………………………………………………
………………………………………………………………………………
(d) State one reason defending your answer in (c) (01 marks)
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
2
(b) State one health risk associated with continued usage of computers.
(01 marks)
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
(b) Name a symbol used when writing functions in a spreadsheet. (01 mark)
……………………………………………………………………………………
4. (a) A student had a file on her laptop and wanted to transfer it to a computer
in a laboratory. Give three devices that she can use to transfer the file.
(03 marks)
(a)…………………………………………………………………………………
(b)…………………………………………………………………………………
(c)…………………………………………………………………………………
(b) Explain the following methods of transferring a file from one location to
another
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
3
5. (a) Give three factors a company should consider before buying any storage
devices. (03 marks)
(i)…………………………………………………………………………………
……………………………………………………………………………………
(ii)…………………………………………………………………………………
…………………………………………………………………………………....
(iii)………………………………………………………………………………..
……………………………………………………………………………………
(b) Teo’s network access speed is six megabytes per second. How many
kilobytes does Teo’s network receive or send per second? (02 marks)
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
6. (a) Give one use for each of the following computer devices.
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
4
(b) Explain the following
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
(i)…………………………………………………………………………………
(ii)…………………………………………………………………………………
(iii)………………………………………………………………………………..
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
…………………………………………………………………………………....
8. (a) State two internet based tool that support web based research.
(02 marks)
(i)…………………………………………………………………………………
(ii)…………………………………………………………………………………
(b) Identify three things one would require in order to get connected to the
internet. (03 marks)
(a)…………………………………………………………………………………
(b)…………………………………………………………………………………
(c)…………………………………………………………………………………
5
9. Outline five factors which determine data transmission speed over the
internet. (05 marks)
(i)…………………………………………………………………………………
(ii)…………………………………………………………………………………
(iii)………………………………………………………………………………..
(iv)………………………………………………………………………………..
(v)…………………………………………………………………………………
10. (a) Give five factors an organization should consider before choosing a
Local Area Network (LAN) model. (05 marks)
(a)…………………………………………………………………………………
……………………………………………………………………………………
(b)…………………………………………………………………………………
……………………………………………………………………………………
(c)…………………………………………………………………………………
……………………………………………………………………………………
(d)…………………………………………………………………………………
……………………………………………………………………………………
(e)…………………………………………………………………………………
……………………………………………………………………………………
11.(a) Write the initial procedure for booting a computer system. (03 marks)
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
6
(b) Give any two measures taken to ensure that computers in a laboratory are
safe. (02 marks)
(i)…………………………………………………………………………………
……………………………………………………………………………………
(ii)…………………………………………………………………………………
……………………………………………………………………………………
12. (a) A computer file is made up of a file name and file extension.
……………………………………………………………………………………
……………………………………………………………………………………
(ii) Write the file extension for word processor document. (01 mark)
……………………………………………………………………………………
(b) Okello deleted his file accidentally in which he can recover his file?
(02 marks)
……………………………………………………………………………………
……………………………………………………………………………………
13. (a) An internet café plans to replace a Cathode Ray Tube(CRT) monitors
with Liquid Crystal Display(LCD) monitors. Why should the café replace CRTs
with LCDs? (05 marks)
(i)…………………………………………………………………………………
……………………………………………………………………………………
(ii)…………………………………………………………………………………
……………………………………………………………………………………
(iii)……………………………………………………………………………….
……………………………………………………………………………………
(iv)………………………………………………………………………………..
……………………………………………………………………………………
(v)…………………………………………………………………………………
……………………………………………………………………………………
7
14. Indicate True or False against each statement in the table below. (05 marks)
Statement True/False
(a) Windows XP is graphical user interface operating system
(b) Presentation software supports multimedia
(c) Word processors have formula bars.
(d) Backup is to combine the content of two or more files to produce
one output file.
(e) The Disk Operating system is menu driven
(i)…………………………………………………………………………………
……………………………………………………………………………………
(ii)…………………………………………………………………………………
……………………………………………………………………………………
(ii)…………………………………………………………………………………
……………………………………………………………………………………
(iii)………………………………………………………………………………
……………………………………………………………………………………
(iv)………………………………………………………………………………
……………………………………………………………………………………
(v)…………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
8
(b) Write down any three application programs that can be obtained from open
source software. (03 marks)
(i)…………………………………………………………………………………
(ii)…………………………………………………………………………………
(iii)………………………………………………………………………………..
17. The table below shows part of a database. Use it to answer the questions that
follow.
……………………………………………………………………………………
……………………………………………………………………………………
(c) The formula entered in the design view to determine TOTAL PAY,
which is a product of SALARY and NO. OF MONTHS is. (02 marks)
……………………………………………………………………………………
……………………………………………………………………………………
9
18. State any five characteristics of modern computer. (05 marks)
(i)…………………………………………………………………………………
……………………………………………………………………………………
(ii)…………………………………………………………………………………
……………………………………………………………………………………
(iii)………………………………………………………………………………..
……………………………………………………………………………………
(iv)……………………………………………………………………………….
……………………………………………………………………………………
(v)…………………………………………………………………………………
……………………………………………………………………………………
19. From the given terminologies used for internet and network below, choose
the correct one to complete each of the statements that follow.
A discussion group
Instant messaging
Video conferencing
A chat room
Online shopping
Telephony
(a) The type of internet communication that allows multiple users to
exchange messages in real time is
called……………………………………………………… ….(01 mark)
………………………………………………………………………………
10
20.(a) Explain the following terms as used in electronic mail.
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
(b) State one requirement needed for one to send an email. (01 mark)
……………………………………………………………………………………
……………………………………………………………………………………
END
11
Candidate’s Name: Random No. Personal
………………………………………………………. No.
Signature ……………………………………………
(Do not write your school/Center Name or Number anywhere on this booklet.)
S850/1
Subsidiary Information
and Communication
Technology
Paper 1
Nov/Dec.2014
2 ⁄ hours
INSTRUCTIONS TO CANDIDATES:
Answer all questions in this paper
All answers should be written in blue or black ink in the spaces provided in the
question paper.
1
Answer all the questions in this paper
1. (a) Explain the term Information and Communication Technology. (02 marks)
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
(i)……………………………………………………………………………………
………………………………………………………………………………………
(ii)……………………………………………………………………………………
………………………………………………………………………………………
(iii)…………………………………………………………………………………
………………………………………………………………………………………
2. Give one reason why a school director would purchase the following equipment
for a computer laboratory.
………………………………………………………………………………………
………………………………………………………………………………………
……………………………………………………………………………………...
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
2
3. During a practical examination students were required to open a blank file and
save its as
D:\STUDENT WORK\EOT PRACTICAL\safety.doc.
(a) State the name of the immediate subfolder in which students must save the file.
(01 mark)
………………………………………………………………………………………
b) Write the root directory onto which the file must be saved. (02 marks)
……………………………………………………………………………………….
c) Suggest one example of a computer application the student can use to create the
file. (01 mark)
………………………………………………………………………………………
d) State the name of the file represented by the above file path. (01 mark)
………………………………………………………………………………………
A B C
D E
A……………………………………………………………………………………
B……………………………………………………………………………………
C……………………………………………………………………………………
3
(b) Give one major similarity between devices A and E. (01 mark)
………………………………………………………………………………………
………………………………………………………………………………………
(c) Identify one device which can be categorized as an output device. (01 mark)
………………………………………………………………………………………
5. Read the statement below and write the words TRUE or FALSE in the spaces
provided. (05 marks)
STATEMENT TRUE/FALSE
(a) Machine code is one of the level computer languages.
(b) Microsoft is the only operating system in use in Uganda
(c) WINZIP is an example of system software which reduces the
actual size of a file
(d) A student delivering a presentation would need an LCD
projector and laptop.
(e) Screen savers can be categorized as desktop publishing
software since they can be used for advertising purposes.
6. (a) State any two adverse effects of using internet for the business and
communication. (02 marks)
(i)……………………………………………………………………………………
………………………………………………………………………………………
(ii)……………………………………………………………………………………
……………………………………………………………………………………….
………………………………………………………………………………………
4
(ii) Instant and real time communication between friends. (01 mark)
………………………………………………………………………………………
………………………………………………………………………………………
7. Identify any three devices other than computers require to set up a network
within a school environment. (03 marks)
(a)……………………………………………………………………………………
(b)……………………………………………………………………………………
(c)……………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
8. (a) List any three possible threats to data in a computer networked environment.
(03 marks)
(i)……………………………………………………………………………………
(ii)…………………………………………………………………………………..
(iii)………………………………………………………………………………….
b) Name any two types of security measures which can be used to control the
threats listed in (a) above. (02 marks)
(i)……………………………………………………………………………………
………………………………………………………………………………………
(ii)……………………………………………………………………………………
………………………………………………………………………………………
5
9. Given below is the notice which the head girl has typed and intends to pin on all
the notice boards in the school.
THE REGIONAL SWIMMING GALA
ON 22ND NOVEMBER 2014
AT MAKERERE UNIVERSITY POOL
FEE: 500
REGISTER WITH HEADGIRL
Explain any five word processing features which the head girl would use to
enhance the appearance of the above notice.
(05 marks)
(a)……………………………………………………………………………………
………………………………………………………………………………………
(b)……………………………………………………………………………………
………………………………………………………………………………………
(c)……………………………………………………………………………………
………………………………………………………………………………………
(d)……………………………………………………………………………………
………………………………………………………………………………………
(e)……………………………………………………………………………………
………………………………………………………………………………………
10. (a) Suggest one way in which computers have been made user friendly for
persons that are physically challenged in the following areas.
………………………………………………………………………………………
………………………………………………………………………………………
6
b) Give three health issues that may be caused by the prolonged use of computers.
(03 marks)
(i)……………………………………………………………………………………
………………………………………………………………………………………
(ii)……………………………………………………………………………………
………………………………………………………………………………………
(iii)…………………………………………………………………………………
………………………………………………………………………………………
11. Choose the appropriate file extensions from the list given for sentences (a) to
(e)
.doc , txt , tif , bat , sys
(a) Program file that perform fundamental operation in a computer. (01 mark)
………………………………………………………………………………………
………………………………………………………………………………………
(c) A file containing series of commands during boot up. (01 mark)
………………………………………………………………………………………
………………………………………………………………………………………
(e) A graphic file created using application such as Adobe Photoshop. (01 mark)
………………………………………………………………………………………
7
12. (a) State any three operations of the machine cycle of a Central Processing
Unit. (03 marks)
(i)…………………………………………………………………………………….
……………………………………………………………………………………….
(ii)……………………………………………………………………………………
……………………………………………………………………………………….
(iii)…………………………………………………………………………………..
………………………………………………………………………………………
(b) Describe any one of the operations stated in (a) above. (02 marks)
………………………………………………………………………………………
………………………………………………………………………………………
13. (a) A set of instructions that are arranged in a logical way to run a computer is
called. (01 marks)
………………………………………………………………………………………
(a)……………………………………………………………………………………
(b)……………………………………………………………………………………
(c)……………………………………………………………………………………
………………………………………………………………………………………
14. (a) Give three benefits of connecting computer to the internet. (03 marks)
(i)……………………………………………………………………………………
………………………………………………………………………………………
(ii)……………………………………………………………………………………
………………………………………………………………………………………
(iii)…………………………………………………………………………………..
………………………………………………………………………………………
8
(b) Outline two disadvantages of connecting computers to the internet. (02 marks)
………………………………………………………………………………………
………………………………………………………………………………………
15. Explain why an organization would prefer to use Electronic Mail (E-mail) over
ordinary mail. (05 marks)
(i)……………………………………………………………………………………
………………………………………………………………………………………
(ii)……………………………………………………………………………………
………………………………………………………………………………………
(iii)…………………………………………………………………………………..
………………………………………………………………………………………
(iv)………………………………………………………………………………….
………………………………………………………………………………………
(v)……………………………………………………………………………………
……………………………………………………………………………………….
16. Outline five areas of self-employment that a sub ICT can engage in. (05 marks)
(i)……………………………………………………………………………………
(ii)……………………………………………………………………………………
(iii)…………………………………………………………………………………..
(iv)…………………………………………………………………………………..
(v)……………………………………………………………………………………
17. Use the terms below to complete the sentences that follow in (a)-(e) (05 marks)
9
(a) The visual presentation from one slide to another
slide…………………………………………………………………………
18. (a) State one difference between a Compact Disc(CD) and Digital Versatile
Disc(DVD). (01 marks)
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
(b) Explain the circumstances under which the following storage devices are used
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
10
19. (a) Describe the following terms in programming languages.
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
20. Using the email address:[email protected], identify what these parts stand for.
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
END
11
Candidate’s Name: Random No. Personal
………………………………………………………. No.
Signature ……………………………………………
(Do not write your school/Center Name or Number anywhere on this booklet.)
S850/1
Subsidiary Information
and Communication
Technology
Paper 1
Nov/Dec.2015
2 ⁄ hours
INSTRUCTIONS TO CANDIDATES:
Answer all questions in this paper
All answers should be written in blue or black ink in the spaces provided in the
question paper.
1
Answer all the questions in this paper
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
2
b) Write one reason for having the following items in the computer laboratory
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
4. (a) Don is a new computer user. As an ICT student advise Don on which
tool to use.
i) To trace files he cannot locate. (01 mark)
……………………………………………………………………………………
……………………………………………………………………………………
(i)…………………………………………………………………………………
……………………………………………………………………………………
(ii)…………………………………………………………………………………
……………………………………………………………………………………
(iii)……………………………………………………………………………….
……………………………………………………………………………………
3
5. State five activities that can be performed on a computer when using a
mouse. (05 marks)
(a)…………………………………………………………………………………
……………………………………………………………………………………
(b)…………………………………………………………………………………
……………………………………………………………………………………
(c)…………………………………………………………………………………
……………………………………………………………………………………
(d)…………………………………………………………………………………
……………………………………………………………………………………
(e)…………………………………………………………………………………
……………………………………………………………………………………
(a)…………………………………………………………………………………
……………………………………………………………………………………
(b)…………………………………………………………………………………
……………………………………………………………………………………
(c)…………………………………………………………………………………
……………………………………………………………………………………
(d)…………………………………………………………………………………
……………………………………………………………………………………
(e)…………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
4
b) Give two advantages of each of the following Operating systems
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
(i)…………………………………………………………………………………
(ii)…………………………………………………………………………………
(a)…………………………………………………………………………………
……………………………………………………………………………………
(b)…………………………………………………………………………………
……………………………………………………………………………………
(c)…………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
5
b) Show three ways in which the internet can facilitate trade and business.
(03 marks)
(a)…………………………………………………………………………………
……………………………………………………………………………………
(b)…………………………………………………………………………………
……………………………………………………………………………………
(c)…………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
11. Explain the following attribute of computers which make them dependable
and reliable tools
a) Diligence. (02 marks)
……………………………………………………………………………………
……………………………………………………………………………………
6
b) Versatility. (02 marks)
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
b) Outline any three ways in which ICT can improve the quality of Education.
(03 marks)
(a)…………………………………………………………………………………
……………………………………………………………………………………
(b)…………………………………………………………………………………
……………………………………………………………………………………
(c)…………………………………………………………………………………
……………………………………………………………………………………
13. (a) State the difference between copy a file and move a file. (02 marks)
……………………………………………………………………………………
…………………….……………………………………………………………..
……………………………………………………………………………………
……………………………………………………………………………………
b). Study the file path below and answer the questions that follow
F\accounts\bursar\fees.xls
……………………………………………………………………………………
7
ii) On what drive is the file located? (01 mark)
……………………………………………………………………………………
……………………………………………………………………………………
(a)…………………………………………………………………………………
(b)…………………………………………………………………………………
(c)…………………………………………………………………………………
b) Give a function of any two input devices listed in (a) above (02 marks)
(a)…………………………………………………………………………………
……………………………………………………………………………………
(b)…………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
(ii) User name. (01 mark)
……………………………………………………………………………………
……………………………………………………………………………………
b) (i) In which type of organization does the domain name of the email, user
above, subscribe to. (01 mark)
……………………………………………………………………………………
ii) Give any other example other than the one type you have stated in b(i) above.
(01 mark)
……………………………………………………………………………………
8
16. (a) Define the term Computer Network. (02 marks)
……………………………………………………………………………………
……………………..……………………………………………………………..
……………………………………………………………………………………
……………………………………………………………………………………
(i)…………………………………………………………………………………
……………………………………………………………………………………
(ii)…………………………………………………………………………………
……………………………………………………………………………………
(iii)……………………………………………………………………………….
……………………………………………………………………………………
17. (a) Differentiate between a server and a client computer. (02 marks)
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
9
18. The table below shows a worksheet which Nabirye was working on .Use it
to answer the questions that follow.
A B C D E
1 ID Number Name Item 1 Item 2 29.1
2 100000 Akello 990 34 11.8
3 100000 Nambi 660 58 #DIV/O!
4 ####### Busingye 8800 -
5 #NAME?
6
a) (i) Suggest a reason why the entry in cell A4 appeared as shown. (01 mark)
……………………………………………………………………………………
……………………………………………………………………………………
(ii) How do you rectify the error in cell A4? (01 mark)
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
(iv) How do you correct the error in cell D5? (01 mark)
……………………………………………………………………………………
……………………………………………………………………………………
19.(a) Tick the three utility programs from the list below. (03 marks)
Tick(√)
Web browser
Data compressor
Disk defragmenter
Operating system
Antivirus software
10
b) State the function of any two utility programs you ticked in (a) above.
(02 marks)
i)…………………………………………………………………………………
…………………………………………………………………………………..
ii)…………………………………………………………………………………
……………………………………………………………………………………
20. (a) Explain the following terms giving an example in each case
……………………………………………………………………………………
……………………………………………………………………………………
…………………………………………………………………………………...
Example
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
Example
……………………………………………………………………………………
Tick here
Optic fiber
Bluetooth
Twisted pair
END
11
Candidate’s Name:
………………………………………………… Random No. Personal
Signature No.
…………………………………………………
(Do not write your school/Center Name or Number anywhere on this booklet.)
S850/1
Subsidiary Information
and Communication
Technology
Paper 1
Nov/Dec.2016
2 ⁄ hours
INSTRUCTIONS TO CANDIDATES:
All answers should be written in blue or black ink in the spaces provided in the
question paper
1
Answer all questions in this paper
(a)……………………………………………………………………………
………………………………………………………………………………
(b)……………………………………………………………………………
………………………………………………………………………………
(c)……………………………………………………………………………
………………………………………………………………………………
(d)……………………………………………………………………………
………………………………………………………………………………
(e)……………………………………………………………………………
………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
(i)…………………………………………………………………………………
……………………………………………………………………………………
(ii)…………………………………………………………………………………
……………………………………………………………………………………
(iii)………………………………………………………………………………
……………………………………………………………………………………
2
3. Use the image below to answer the question that follows.
(a) Write down the path for the subfolder called My Videos. (03 marks)
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
(b) Describe a method you can use to recover an accidentally deleted folder
from the desktop. (02 marks)
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
3
(d) Bus
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
(b) Fill in the right file extension for the following file. (03 marks)
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
(b) Give the two categories of printers and an example in each case.
(i) Category………………………………………………………………………
Example……………………………………………………………………...
(02 marks)
(ii) Category………………………………………………………………………
Example………………………………………………………………………
(02 marks)
4
7. (a) Distinguish between system and application software. (02 marks)
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
(b) Give three types of language translators used in programming. (03 marks)
(i)…………………………………………………………………………………
(ii)…………………………………………………………………………………
(ii)…………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
(b) Storage device is one of the categories of computer hardware. List the other
three categories. (03 marks)
(i)…………………………………………………………………………………
(ii)…………………………………………………………………………………
(iii)………………………………………………………………………………..
STATEMENTS TRUE/FALSE
(a) Public domain software is copyrighted
(b) Off-the-shelf software is developed and sold for profit
(c) Source codes of open source software programs are only available
to paid up subscribers.
(d) Shareware programs are widely available from a variety of
download sites on the internet
(e) Freeware programs are frequently developed by only amateur
programmers.
5
10. (a) Define the term Motherboard. (02 marks)
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
(b) Identify any three components housed on the motherboard. (03 marks)
(i)…………………………………………………………………………………
(ii)…………………………………………………………………………………
(iii)………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
…………………………………………………………………………………..
(b) List any two desktop publication soft wares (02 marks)
(i)…………………………………………………………………………………
(ii)…………………………………………………………………………………
……………………………………………………………………………………
6
12. Complete the table below. (05 marks)
13. Computer data and software are exposed to a number of risks hence need for
great care and protection. Suggest five ways of protecting data and software.
(05 marks)
(a)…………………………………………………………………………………
……………………………………………………………………………………
(b)…………………………………………………………………………………
……………………………………………………………………………………
(c)…………………………………………………………………………………
……………………………………………………………………………………
(d)…………………………………………………………………………………
……………………………………………………………………………………
(e)…………………………………………………………………………………
……………………………………………………………………………………
7
14. (a) Give three benefits for sending documents using email service.
(03 marks)
(i)…………………………………………………………………………………
……………………………………………………………………………………
(ii)…………………………………………………………………………………
……………………………………………………………………………………
(iii)………………………………………………………………………………
……………………………………………………………………………………
(b) State two benefits for sending documents using ordinary post. (02 marks)
(i)…………………………………………………………………………………
……………………………………………………………………………………
(ii)…………………………………………………………………………………
……………………………………………………………………………………
15. Use the terms below to complete the statements that follow. (05 marks)
8
16. (a) Distinguish between hyperlink and homepage. (02 marks)
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
(b) Identify three netiquette guidelines while using the internet. (03 marks)
(i)…………………………………………………………………………………
……………………………………………………………………………………
(ii)…………………………………………………………………………………
……………………………………………………………………………………
(iii)………………………………………………………………………………
……………………………………………………………………………………
(i)…………………………………………………………………………………
(ii)…………………………………………………………………………………
(i)…………………………………………………………………………………
……………………………………………………………………………………
(ii)…………………………………………………………………………………
……………………………………………………………………………………
(ii)…………………………………………………………………………………
……………………………………………………………………………………
Rename Watermark
Bookmark Mail Merge
Merge Pointer
Cursor Indent
(05 marks)
9
(a) A background feature in a document is referred to as
………………………………………………………………………………
(b) The feature that allows duplication of a document with unique addresses
is
……………………………………………………………………………
(c) The feature that starts a line of text further from the margin is
………………………………………………………………………………..
………………………………………………………………………………
………………………………………………………………………………..
(a) Communication
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
(b) Network
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
(c) Protocol
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
10
(d) Modem
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
(e) Bandwidth
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
(a)…………………………………………………………………………………
……………………………………………………………………………………
(b)…………………………………………………………………………………
……………………………………………………………………………………
(c)…………………………………………………………………………………
……………………………………………………………………………………
(d)…………………………………………………………………………………
……………………………………………………………………………………
(e)…………………………………………………………………………………
……………………………………………………………………………………
END
11
Candidate’s Name:……………………………………………………………...
Random No. Personal No.
Signature: …………………………………………
(Do not write your school/Center Name or Number anywhere on this booklet.)
S850/1
Subsidiary Information
and Communication
Technology
Paper 1
Nov./Dec.2017
2 ⁄ hours
INSTRUCTIONS TO CANDIDATES:
All answers should be written in blue or black ink in the spaces provided in the
question paper
1. (a) Name one tool used to remove dust from a computer. (01 mark)
……………………………………………………………………………
(b) Give reasons why one would require the following in the computer
laboratory;
(i) Uninterruptible Power Supply. (02 marks)
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
2. (a) Write down the procedure for changing the name of an existing file or
folder. (03 marks)
(i)…………………………………………………………………………
……………………………………………………………………………
(ii)…………………………………………………………………………
……………………………………………………………………………
(iii)…………………………………………………………………………
…………………………………………………………………………….
(b) Explain the function of a device driver in a computer system.
(02 marks)
……………………………………………………………………………
……………………………………………………………………………
…………………………………………………………………………….
1
3. Write the following in full as used in Information and Communication
Technology; (05 marks)
(a) CCTV……………………………………………………………
(b) ROM…………………………………………………………….
(c) CAD……………………………………………………………..
(d) CPU……………………………………………………………...
(e) VDU……………………………………………………………..
4. (a) Identify one storage device that is resistant to virus attacks. (01 mark)
……………………………………………………………………………..
(b) Describe the following terms as used in computers;
(i) File. (02 marks)
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
2
6. Indicate TRUE or FALSE against each statement in the table below:
(05 marks)
STATEMENT TRUE/FALSE
(a) Open source software is copyrighted and distributed
without cost for trial period.
(b) Product activation is used to ensure that software is not
installed illegally.
(c) Programming software interfaces user application and
computer hardware.
(d) A file extension is a combination of characters used to
identify a file.
(e) A clipboard holds copied data
3
Turn Over
(b) Outline any four functions of an operating system. (04 marks)
(i)…………………………………………………………………………
……………………………………………………………………………
(ii)…………………………………………………………………………
…………………………………………………………………………….
(iii)…………………………………………………………………………
……………………………………………………………………………..
(iv)…………………………………………………………………………
……………………………………………………………………………..
9. (a) Distinguish between Reading and Writing in relation to storage
medium. (02 marks)
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
(b) Mention one example for each of the types of storage devices given
below: (03 marks)
(i) Optical storage…………………………………………….....
(ii) Magnetic storage……………………………………………..
(iii) Solid state…………………………………………………….
10.(a) Name any two examples of documents created using desktop
publishing application. (02 marks)
(i)…………………………………………………………………………..
(ii)………………………………………………………………………….
(b) State any three desktop publishing features that enhance the
documents you have named in 10(a). (03 marks)
(i)…………………………………………………………………………..
(ii)………………………………………………………………………….
(iii)…………………………………………………………………………
4
11.(a) Outline any three threats a System Administrator may face as a result
of networking computers. (03 marks)
(i)………………………………………………………………………......
......................................................................................................................
(ii)…………………………………………………………………………
…………………………………………………………………………….
(iii)…………………………………………………………………………
……………………………………………………………………………..
(b) Suggest any two measures that the system administrator can employ
to reduce the network threats. (02 marks)
(i)…………………………………………………………………………
……………………………………………………………………………
(ii)…………………………………………………………………………
……………………………………………………………………………
12.Study the data communication diagram below and answer the questions
that follow:
B
A C
(a) Name the elements of data communication labelled; (03 marks)
A. ………………………………………………………………………
B. ………………………………………………………………………
C. ………………………………………………………………………
(b) Suggest the devices used to connect A to B. (01 mark)
………………………………………………………………………………...
(c) State the protocol used to uniquely identify A and C. (01 mark)
………………………………………………………………………………...
5
Turn Over
13.The table below consists of some of the peripheral devices of a computer.
Indicate Input or Output. (05 marks)
……………………………………………………………………………
…………………………………………………………………………….
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
…………………………………………………………………………….
6
15.(a) Name one example of a presentation software. (01 mark)
……………………………………………………………………………..
(b) Give the importance of each of the following features as used in
electronic presentation;
(i) Master slide. (02 marks)
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
(ii) Transitions. (02 marks)
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
16.(a) State three advantages of using e-mail services over sending mail by
post. (03 marks)
(i)…………………………………………………………………………
……………………………………………………………………………
(ii)…………………………………………………………………………
…………………………………………………………………………….
(iii)…………………………………………………………………………
……………………………………………………………………………
(b) State two advantages of post-mail services over e-mail
communication. (02 marks)
(i)…………………………………………………………………………
……………………………………………………………………………
(ii)…………………………………………………………………………
……………………………………………………………………………
7
Turn Over
17.Give five examples of networking hardware. (05 marks)
(a)…………………………………………………………………………..
(b)…………………………………………………………………………..
(c)………………………………………………………………………….
(d)………………………………………………………………………….
(e)………………………………………………………………………….
18.Outline five ways in which a student can use the internet. (05 marks)
(a)…………………………………………………………………………
…………………………………………………………………………….
(b)…………………………………………………………………………
…………………………………………………………………………….
(c)…………………………………………………………………………
……………………………………………………………………………..
(d)…………………………………………………………………………
…………………………………………………………………………….
(e)…………………………………………………………………………
…………………………………………………………………………….
19.(a) (i) What is data transmission media? (01 mark)
……………………………………………………………………………
……………………………………………………………………………
(ii) Give two examples of transmission media. (02 marks)
(i)…………………………………………………………………………
(ii)…………………………………………………………………………
(b) Name two services offered by data communication tools. (02 marks)
(i)………………………………………………………………………….
(ii)…………………………………………………………………………
8
Turn Over
20. (a) Give any two services that use Electronic payment (E-payment) method.
(02 marks)
(i) …………………………………………………………………...
(ii) …………………………………………………………………..
(i)…………………………………………………………………………………
……………………………………………………………………………………
(ii)…………………………………………………………………………………
……………………………………………………………………………………
(iii)………………………………………………………………………………
……………………………………………………………………………………
9
END
Candidate’s name……………………………………………………………...
Random No. Personal No.
Signature ……………………………………….
(Do not write your school/Center Name or Number anywhere on this booklet)
S850/1
Subsidiary Information
and Communication
Technology
Paper 1
Nov./Dec.2018
2 ⁄ hours
INSTRUCTIONS TO CANDIDATES:
All answers should be written in blue or black ink in the spaces provided in the
question paper
1
©2018 Uganda National Examinations Board Turn Over
Answer all questions in this paper.
1. (a) List three major specifications one would consider when buying a laptop
computer. (03 marks)
(i) ……………………………………………………………………………..
(ii) ……………………………………………………………………………..
(iii) …………………………………………………………………………….
(b) Illustrate the information processing cycle. (02 marks)
2. (a) Distinguish between cold booting and warm booting. (02 marks)
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
(b) Give three circumstances under which a computer can be warm booted.
(03 marks)
(i) ……………………………………………………………………………
……………………………………………………………………………….
(ii) ……………………………………………………………………………
……………………………………………………………………………….
(iii) ……………………………………………………………………………
………………………………………………………………………………..
3. (a) What is Information and Communication Technology (ICT)? (02 marks)
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
2
(b) Outline any three measures that can be taken to prevent environmental
degradation through the use of ICT. (03 marks)
(i) …………………………………………………………………………………
(ii)…………………………………………………………………………………
(iii)………………………………………………………………………………..
4. (a) Give two reasons why file management is important in a computer system.
(02 marks)
(i) ……………………………………………………………………………
………………………………………………………………………………...
(ii) ……………………………………………………………………………
……………………………………………………………………………….
(b) List three operations which can be performed on a file. (03 marks)
(i) ………………………………………………………………………….
(ii) ………………………………………………………………………….
(iii) ………………………………………………………………………….
3
6. (a) Define an input device. (01 mark)
……………………………………………………………………………………
……………………………………………………………………………………
(b) Name two basic input devices associated with common desktop computers.
(02 marks)
(i)……………………………………………………………………………………..
(ii)…………………………………………………………………………………….
(c) Identify an input device for each of the following data. (02 marks)
(i) Sound……………………………………………………………………………...
(ii) Images……………………………………………………………………………
8. Ali has a DVD full of data and would like to transfer the data to CDs. The
capacity of the DVD is 4.7 GB and each CD is 700MB. Calculate the
number of CDs he would need to transfer all his data. (05 marks)
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
4
9. (a) Define the term Tailor-made software. (01 mark)
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………………………
(b) Outline any four qualities of good application software. (04 marks)
(i) ……………………………………………………………………………
……………………………………………………………………………….
(ii) ……………………………………………………………………………
……………………………………………………………………………….
(iii) ……………………………………………………………………………
………………………………………………………………………………..
(iv) ……………………………………………………………………………
………………………………………………………………………………..
10. (a) Write the following computer abbreviations in full. (02 marks)
(i) CPU…………………………………………………………………….
(ii) ALU……………………………………………………………………
(b) State the role of each of the following CPU components. (03 marks)
(i) Bus………………………………………………………………………..
………………………………………………………………………………..
(iii) Registers………………………………………………………………
………………………………………………………………………………
11. (a) Distinguish between utilities and application software. (02 marks)
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
5
(b) Give three examples of utility programs. (03 marks)
(i) …………………………………………………………………………………
(ii)…………………………………………………………………………………
(iii)………………………………………………………………………………..
6
14. (a) Give two reasons to justify ownership of institutional websites.
(02 marks)
(i) ……………………………………………………………………………
……………………………………………………………………………….
(ii) ……………………………………………………………………………
………………………………………………………………………………..
………………………………………………………………………………
……………………………………………………………………………….
(ii) Under what circumstances can someone use a Uniform Resource
Locator (URL) in a web browser? (02 marks)
………………………………………………………………………………
………………………………………………………………………………
……………………………………………………………………………….
15. Give any five advantages of using automation in an industry. (05 marks)
(i) ……………………………………………………………………………
……………………………………………………………………………….
(ii) ……………………………………………………………………………
………………………………………………………………………………...
(iii) ……………………………………………………………………………
……………………………………………………………………………….
(iv) ……………………………………………………………………………
……………………………………………………………………………….
(v) ……………………………………………………………………………
……………………………………………………………………………….
16. (a) Define data communication. (01 mark)
………………………………………………………………………………
………………………………………………………………………………
………………………………………………………………………………
7
(b) State any four requirements for setting up a computer network. (04 marks)
(i)………………………………………………………………………………
(ii)………………………………………………………………………………
(iii)………………………………………………………………………………
(iv)……………………………………………………………………………….
17. For questions (a)-(e), fill in the missing words from the list below:(05 marks)
(i) …………………………………………………………………………………
(ii)…………………………………………………………………………………
8
19. (a) Give two situations under which electronic presentations would be used.
(02 marks)
(i)………………………………………………………………………………
………………………………………………………………………………...
(ii)……………………………………………………………………………
………………………………………………………………………………...
(b) State three advantages of using electronic presentations over the traditional
chalk and talk. (03 marks)
(i)…………………………………………………………………………………
……………………………………………………………………………………
(ii)…………………………………………………………………………………
……………………………………………………………………………………
(iii)………………………………………………………………………………
……………………………………………………………………………………
END
9
Candidate’s name……………………………………………………………...
Random No. Personal No.
Signature ……………………………………….
(Do not write your school/Center Name or Number anywhere on this booklet)
S850/1
Subsidiary Information
and Communication
Technology
Paper 1
Nov./Dec.2019
2 ⁄ hours
INSTRUCTIONS TO CANDIDATES:
All answers should be written in blue or black ink in the spaces provided in the
question paper
(b) Give any three peripheral devices of a desktop computer. (03 marks)
(i) ………………………………………………………………………
(ii) ………………………………………………………………………
(iii) ………………………………………………………………………
2. (a) State one reason why a computer laboratory should have: (03 marks)
(i) A good lighting system.
……………………………………………………………………………
……………………………………………………………………………..
……………………………………………………………………………
…………………………………………………………………………….
……………………………………………………………………………
…………………………………………………………………………….
(b) Give two measures a computer laboratory technician should put in place
to improve on the electricity power security. (02 marks)
(i) ………………………………………………………………………
……………………………………………………………………………..
(ii) ………………………………………………………………………
……………………………………………………………………………..
2
3. Outline the negative impact of ICT on the following sectors;
(a) Economic sector. (02 marks)
(i) ………………………………………………………………………
…………………………………………………………………………….
(ii) ………………………………………………………………………
……………………………………………………………………………..
(b) Social sector. (03 marks)
(i) ………………………………………………………………………
……………………………………………………………………………
(ii) ………………………………………………………………………
…………………………………………………………………………….
4. (a) Describe the booting process of a computer. (03 marks)
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
…………………………………………………………………………….
(i) ………………………………………………………………………
……………………………………………………………………………..
(ii) ………………………………………………………………………
…………………………………………………………………………….
5. Identify the following input devices:
A B C D E
3
A. ……………………………………………………………………………..
B. ……………………………………………………………………………..
C. ……………………………………………………………………………..
D. …………………………………………………………………………….
E. ……………………………………………………………………………..
6. (a) Differentiate between system files and Document files. (02 marks)
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………..
(b) Give three circumstances under which the computer user may choose the
option save as from a file menu. (03 marks)
(i) ………………………………………………………………………
…………………………………………………………………………….
(ii) ………………………………………………………………………
…………………………………………………………………………….
(iii) ………………………………………………………………………
…………………………………………………………………………….
7. (a) Distinguish between primary storage and secondary storage.
(02 marks)
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………..
(b) Name one example of primary storage and two examples of secondary
storage.
4
(ii) Secondary ……………………………………………………….
……………………………………………………….
(02 marks)
8. (a) Describe a Graphical User Interface (GUI). (02 marks)
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………..
(b) State one function of each of the following desktop icons. (03 marks)
(i) My computer.
……………………………………………………………………………
…………………………………………………………………………….
(ii) Recycle bin.
……………………………………………………………………………
…………………………………………………………………………….
(iii) My documents.
……………………………………………………………………………
…………………………………………………………………………….
5
(c) Decoding. (02 marks)
……………………………………………………………………………………
……………………………………………………………………………………
……………………………………………………………………..…………….
10. (a) Explain any two elements of the “off-the-shelf” software. (04 marks)
(i) ………………………………………………………………………
……………………………………………………………………………
…………………………………………………………………………….
(ii) ………………………………………………………………………
……………………………………………………………………………
…………………………………………………………………………….
……………………………………………………………………………………
11. (a) List any two requirements for Internet connection. (02 marks)
(i) ………………………………………………………………………
(ii) ………………………………………………………………………
(i) ………………………………………………………………………
(ii) ………………………………………………………………………
(iii) ………………………………………………………………………
12. (a) State one function of each of the following utility programs:
(i) Diagnostic utility. (03 marks)
……………………………………………………………………………
…………………………………………………………………………….
6
(ii) File Compression Utility.
……………………………………………………………………………
……………………………………………………………………………..
……………………………………………………………………………
…………………………………………………………………………….
(b) Outline two ways of reducing the spread of computer viruses. (02 marks)
(i) ………………………………………………………………………
……………………………………………………………………………..
(ii) ………………………………………………………………………
……………………………………………………………………………..
13. (a) Write WWW in full as used in Internet technology. (01 mark)
……………………………………………………………………………
…………………………………………………………………………….
(b) Distinguish between a Web browser and a Search engine. (02 marks)
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………..
……………………………………………………………………………
……………………………………………………………………………..
……………………………………………………………………………
…………………………………………………………………………….
……………………………………………………………………………
……………………………………………………………………………..
15. (a) Outline any three violation of computer ethics usage by computer users.
(03 marks)
(i) ………………………………………………………………………
…………………………………………………………………………….
(ii) ………………………………………………………………………
……………………………………………………………………………..
(iii) ………………………………………………………………………
……………………………………………………………………………..
(b) Suggest two measures that should be put I place to guard against
information pivacy in an organization. (02 marks)
(i) ………………………………………………………………………
……………………………………………………………………………..
(ii) ………………………………………………………………………
……………………………………………………………………………..
8
16. List five elements of data communication. (05 marks)
(i) ………………………………………………………………………
(ii) ………………………………………………………………………
(iii) ………………………………………………………………………
(iv) ………………………………………………………………………
(v) ………………………………………………………………………
(a) Which computer application was used to design the given budget?
(01 mark)
……………………………………………………………………………..
(b) Identify the cell formatting feature which was applied to contents in the
D1 and E1. (01 mark)
……………………………………………………………………………..
……………………………………………………………………………..
(ii) TOTAL COST in pounds (£). (Use the exchange rate in cell B7).
(02 marks)
……………………………………………………………………………..
9
18. Describe any five tasks that are performed by digital forensic specialists.
(05 marks)
(i) ………………………………………………………………………
……………………………………………………………………………..
(ii) ………………………………………………………………………
…………………………………………………………………………….
(iii) ………………………………………………………………………
……………………………………………………………………………..
(iv) ………………………………………………………………………
…………………………………………………………………………….
(v) ………………………………………………………………………
……………………………………………………………………………..
19. (a) State the use of each of the following features in a presentation:
(03 marks)
(i) Slide looping.
……………………………………………………………………………
…………………………………………………………………………….
……………………………………………………………………………
…………………………………………………………………………….
(iii) Hyperlinks.
……………………………………………………………………………
…………………………………………………………………………….
(b) Give one advantage of using the following on presentation. (02 marks)
(i) Handouts.
……………………………………………………………………………
……………………………………………………………………………..
10
(ii) Note pages.
……………………………………………………………………………
…………………………………………………………………………….
20. (a) Outline any two uses of a server in a computer network. (02 marks)
(i) ………………………………………………………………………
……………………………………………………………………………..
(ii) ………………………………………………………………………
……………………………………………………………………………..
(i) ………………………………………………………………………
(ii) ………………………………………………………………………
(iii) ………………………………………………………………………
END
11
Candidate’s name…………………………………………………………
Random No. Personal No.
Signature ……………………………………….
(Do not write your school/Center Name or Number anywhere on this booklet)
S850/1
Subsidiary Information
and Communication
Technology
Paper 1
Nov./Dec.2020
2 ⁄ hours
INSTRUCTIONS TO CANDIDATES:
For Examiners’s Use Only
Questions
This paper is made up of twenty equally Marks Initials
weighted questions 1-2
3-4
Answer all questions in this paper 5-6
7-8
All answers should be written in blue or 9-10
black ink in the spaces provided in the 11-12
question paper 13-14
15-16
17-18
19-20
Total
1
©2020 Uganda National Examinations Board Turn Over
Answer all questions in this paper.
(b) Suggest any two measures you would take to prevent loss and/or damage of
data in computers. (02 marks)
(i) …………………………………………………………………………
…………………………………………………………………………………
(ii) …………………………………………………………………………
…………………………………………………………………………………
(c) Give one reason why computers should be serviced. (01 mark)
…………………………………………………………………………………
…………………………………………………………………………………
2
3. (a) Explain the term Short Cut as used in computers. (02 marks)
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
(b) Identify three limitations of using the desktop as a sole file storage
location/directory. (03 marks)
(i) …………………………………………………………………………
…………………………………………………………………………………
(ii) …………………………………………………………………………
…………………………………………………………………………………
(iii) …………………………………………………………………………
…………………………………………………………………………………
4. (a) A specialized device that moves the pointer on a computer is called the.
(01 mark)
…………………………………………………………………………………
(b) Name two devices that serve as both input and output devices. (02 marks)
(i) …………………………………………………………………………..
(ii) …………………………………………………………………………..
(c) What device can be used to capture information shown in the picture below?
……………………………………………………………………………….
4
(ii) Peer-to-Peer. (02 marks)
…………………………………………………………………………………
…………………………………………………………………………………
………………………………………………………………………………..
11. (a) Distinguish between high level programming languages and low level
programming languages. (02 marks)
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
(b) Give three advantages of high level programming languages. (03 marks)
(i) …………………………………………………………………………
………………………………………………………………………………
(ii) …………………………………………………………………………
…………………………………………………………………………………
(iii) …………………………………………………………………………
…………………………………………………………………………………
12. (a) Outline any three advantages of a flash disk. (03 marks)
6
(i) …………………………………………………………………………
…………………………………………………………………………………
(ii) …………………………………………………………………………
…………………………………………………………………………………
(iii) …………………………………………………………………………
…………………………………………………………………………………
(b) Suggest any two ways of creating more storage space on a flash disk.
(02 marks)
(i) …………………………………………………………………………
…………………………………………………………………………………
(ii) …………………………………………………………………………
…………………………………………………………………………………
13. Write TRUE or FALSE against statement from (a) to (e) in the table below.
(05 marks)
STATEMENT TRUE/FALSE
(a) Image viewer utility displays content of graphics.
14. (a) Explain the term Internet Service Provider (ISP). (02 marks)
………………………………………………………………………………………
………………………………………………………………………………………
………………………………………………………………………………………
Turn Over
……………………………………………………………………………………….
(b) Give three examples of web browsers. (03 marks)
7
(i) …………………………………………………………………………
(ii) …………………………………………………………………………
(iii) …………………………………………………………………………
15. Identify five wireless communication media which can be used to connect network
devices as follows:
(a) Within the same room. (02 marks)
(i) ………………………………………………………………………….
(ii) …………………………………………………………………………
(b) Between users in the same city. (03 marks)
(i) ………………………………………………………………………….
(ii) ………………………………………………………………………….
(iii) ………………………………………………………………………….
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
8
17. The table below shows results from an ICT class extracted from a spreadsheet
application. Use it to answer questions (a) to (c).
A B C D E F
1 No. Name Assignment Test Examination Average
2 1 Peter 56 74 89
3 2 Lindah 82 45 85
4 3 Rayyam 100 95 90
5 4 Josephine 50 90 65
6 5 Musa 60 57 80
7 6 Amina 38 77 62
(a) Write the formula that can be used to determine the average score for Peter.
(02 marks)
…………………………………………………………………………………
…………………………………………………………………………………
(b) Describe the procedure you should follow to obtain the average scores of the
students using your formula in (a). (02 marks)
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
What function would you use to position the students? (01 mark)
…………………………………………………………………………………
18. Study the computer specifications in the table below and answer questions that
follow.
Computer specifications Computer
A B
Clock Rate 1.7GHZ 1.2GHZ
Random Access Memory 2GB 100MB
Hard Disk 200MB 5GB
9
(b) State two reasons to support your answer in (a). (02 marks)
(i) …………………………………………………………………………
…………………………………………………………………………………
(ii) …………………………………………………………………………
…………………………………………………………………………………
(c) Identify the computer with a higher capacity and give the reason why.
(02 marks)
…………………………………………………………………………………
…………………………………………………………………………………
19. (a) Define the term software package /suite. (02 marks)
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
(b) (i) Give one example of a software package /suite. (01 mark)
…………………………………………………………………………………
(ii) List any two components of your example in (b) (i). (02 marks)
…………………………………………………………………………………
…………………………………………………………………………………
20. (a) Name any two network communication devices. (02 marks)
(i) …………………………………………………………………………..
(ii) ………………………………………………………………………….
(i) …………………………………………………………………………
…………………………………………………………………………………
(ii) …………………………………………………………………………
…………………………………………………………………………………
(iii) …………………………………………………………………………
………………………………………………………………………………..
10
END
Candidate’s name…………………………………………………………
Random No. Personal No.
Signature ……………………………………….
(Do not write your school/Center Name or Number anywhere on this booklet)
S850/1
Subsidiary Information
and Communication
Technology
Paper 1
Nov./Dec.2022
2 ⁄ hours
INSTRUCTIONS TO CANDIDATES:
For Examiners’s Use Only
Questions
This paper is made up of twenty equally Marks Initials
weighted questions 1-2
3-4
Answer all questions in this paper 5-6
7-8
All answers should be written in blue or 9-10
black ink in the spaces provided in the 11-12
question paper 13-14
15-16
17-18
19-20
Total
1
©2022 Uganda National Examinations Board Turn Over
Answer all questions in this paper.
…………………………………………………………………………………
(i) …………………………………………………………………………..
(ii) …………………………………………………………………………..
(iii) ………………………………………………………………………….
(a) State the storage medium for the folder. (01 mark)
…………………………………………………………………………………
…………………………………………………………………………………
(c) Identify the subfolder where the files are located. (01 mark)
…………………………………………………………………………………
2
3. (a) State three qualities of a good printer. (03 marks)
(i) ………………………………………………………………………….
(ii) …………………………………………………………………………..
(iii) ………………………………………………………………………….
………………………………………………………………………….
…………………………………………………………………………
3
5. (a) Distinguish between System Software and Application Software.
(02 marks)
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
………………………………………………………………………………..
(ii) ………………………………………………………………………….
(iii) …………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
(ii) …………………………………………………………………………
…………………………………………………………………………………
(iii) …………………………………………………………………………
…………………………………………………………………………………
4
7. (a) Write BIOS in full. (01 mark)
…………………………………………………………………………..…….
(b) Explain the following booting processes:
(i) Cold booting. (02 marks)
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………..
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
…………………………………………………………………………….
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………..
5
9. (a) Differentiate a repeater from a switch as basic networking devices.
(02 marks)
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
(i) ………………………………………………………………………….
(ii) ………………………………………………………………………….
(iii) ………………………………………………………………………….
…………………………………………………………………………………
…………………………………………………………………………………
(b) Give three reasons for the increasing e-learning facilities in educational
institutions. (03 marks)
(i) …………………………………………………………………………
…………………………………………………………………………………
(ii) …………………………………………………………………………
…………………………………………………………………………………
(iii) …………………………………………………………………………
…………………………………………………………………………………
6
11. (a) Define the term information security. (01 mark)
…………………………………………………………………………………
…………………………………………………………………………………
(b) Describe any two ways of ensuring data and information security.
(04 marks)
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
12. (a) Identify the following secondary storage devices. (03 marks)
Storage Device Name of the device
(i) …………………………………………………………………………
(ii) ………………………………………………………………………….
7
13. (a) Explain the use of each of the following software below:
(i) Device drivers. (02 marks)
…………………………………………………………………………
…………………………………………………………………………
…………………………………………………………………………
…………………………………………………………………………
………………………………………………………………………….
…………………………………………………………………………
…………………………………………………………………………
…………………………………………………………………………
………………………………………………………………………….
…………………………………………………………………………………
…………………………………………………………………………………
(b) Describe how you can use email services to do the following:
(i) Send a file from a storage device. (02 marks)
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
………………………………………………………………………………..
8
(ii) Send an email message you received to another person. (02 marks)
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
………………………………………………………………………………..
(b) State three ways in which one can use the Global Positioning System (GPS).
(03 marks)
(i) …………………………………………………………………………
…………………………………………………………………………………
(ii) …………………………………………………………………………
…………………………………………………………………………………
(iii) …………………………………………………………………………
………………………………………………………………………………..
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
………………………………………………………………………………..
9
(ii) Record . (02 marks)
…………………………………………………………………………
…………………………………………………………………………
…………………………………………………………………………
………………………………………………………………………….
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
(ii) ………………………………………………………………………….
(c) A network device that converts digital signals into analog and vice versa is
called a…………………………………………..…… (01 mark)
…………………………………………………………………………………
(ii) …………………………………………………………………………
…………………………………………………………………………………
(iii) …………………………………………………………………………
…………………………………………………………………………………
10
(b) Give two basic components of a Graphical User Interface (GUI). (02 marks)
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
…………………………………………………………………………………
19. (a) (i) What is wireless transmission? (02 marks)
…………………………………………………………………………
…………………………………………………………………………
…………………………………………………………………………
………………………………………………………………………….
…………………………………………………………………………..
(i) …………………………………………………………………………
………………………………………………………………………….
(ii) …………………………………………………………………………
………………………………………………………………………….
20. (a) Suggest any two ways the speed of a computer can be improved. (02 marks)
(i) …………………………………………………………………………
…………………………………………………………………………
………………………………………………………………………….
(ii) …………………………………………………………………………
…………………………………………………………………………
………………………………………………………………………….
11
(b) Given the following ports; (03 marks)
Serial
Universal Serial Bus
Network
Parallel
Identify from the list, the appropriate port for each of the given users below :
12
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
UNEB UACE SAMPLE PAPER 2013
MARKING GUIDE
1. (a). Modern computers transform data into information. The stages are:
Data collection.
Preparation of data
Input of Data
Processing of data
Storage of data
Output of results
(b) Identify one device that can facilitate any one of the stages listed above.
(01 mark)
Input stage-Keyboard, Mouse, trackball, joystick, Microphone, Scanner
Processing stage-Motherboard, Central Processing Unit, RAM Chips, ROM
Chips.
Output of data-Monitor, Printer, Projector.
Storage of data-Memory Cards, Flash disks, HDDs, CD&DVDs
2. State any five characteristics of a computer. (05 marks)
High Speed: computer can perform millions (1,000,000) of
instructions and even more per second.
High level of Accuracy: The degree of accuracy of computer is very
high and every calculation is performed with the same accuracy.
Diligence: A computer is free from tiredness, lack of concentration,
fatigue, etc. They are very meticulous and are capable of doing and
repeating similar task without tiring or getting bored.
Versatility: It has capability to perform completely different type of
work at the same time- multitasking, multi-programmable etc.
Memory: The Computer has an in-built memory and we can store a
large amount of data during processing.
Large storage Capacity: Unlike other data processors, computers
are capable holding large amounts of data for long time without
losing it through their storage media like; HDD, CDs, flash disks,
DVDs, etc.
Artificial intelligence (AI): AI = Ability of computer to mimic human
thought. Computers are very intelligent devices and can receive
and respond to requests, and give the appropriate response.
Automation and programmability: Computers receive and work on
instruction on their own. They work on minimal human intervention.
Page 1
3. (a) What is computer literacy. (02 marks)
The ability to use and apply computer skills so as to solve day to day problems.
(b) Identify the file extensions for the following files. (03 marks)
A word processor document e.g Ms word File extensions is .doc.
A spreadsheet file e.g Ms Excel is . xls
A presentation file e.g powerpoint is .ppt
Page 2
b). Judith can transfer the file to the computer lab by use of any of the
following devices:
Flash disk drive
Memory card drive
CD-ROM drive
DVD-ROM drive
Blue Ray drive
HDD-DVD drive
Floppy diskettes
Zip drive
Magnetic tape drive
Item Hardware Function
a) Cache Memory A high speed memory built into the CPU that
temporarily store data during processing
b) Control unit [CU] Part of the CPU unit that co-ordinates its
operations
c) A register [R] A fast memory chip located on or near the CPU
unit to help speed up processing
d) A serial port Used to connect up to 127 peripheral devices to
a computer to a computer without additional expansion.
9. (a) Distinguish between a Local Area Network and Wide Area Network.
10. What suitable application programs would you use to perform the
following tasks?
Page 4
11. (a) What is social networking website? (02 marks)
Any website that enables users to create public profiles, share resources within the
website and form relationships with other others. e.g Facebook, Skype, Telegram,
Whatsapp, Twitter.
Facebook
Twitter
Instagram
Whatsapp
Linkedn
12. Outline any five services that are offered by the internet service
providers. (05 marks)
Chat rooms
Instant messaging
Email
File sharing
Video conferencing
Message boards
Internet telephony
Page 5
13. (a) State two advantages of using E-mails software over ordinary
postal letters. (02 marks)
(b) What are the uses of the following features of E-mail software?
(i) To: (01 mark)
This show the email address of the recipient of the mail. It’s where you typeset
the E-mail address of the receiver
(ii) BCC. (02 marks)
Enables copies of the E-mail to be sent to a third party without acknowledging any
other recipients
14. Indicate True or False for the following statements. (05 marks)
Page 6
15. (a) Define the term Bluetooth? (02 marks)
Bluetooth is a wireless technology standard for exchanging data over short
distances using short radio waves.
(b) Name any three networking protocols. (03 marks)
Page 7
(b) Outline any two ways to enforce computer laboratory security.
(02 marks)
Use of burglar proof doors, windows and locking systems
Avoid dust in the lab by regular cleaning- mopping, sweeping, dusting of
shoes, woolen carpets etc.
Avoid carrying food items- water etc in the computer laboratory
Avoid use of storage devices like flash disks that are infected with virus
Disable ports to avoid carrying thru flash disks into ur computer
Installing updated anti-virus and Use of updated antivirus to avoid oss of data
and computer crash.
Proper ventilation and installing air conditioners and fans
Employ security guards to keep the computer lab safe from strangers
Ensure steady supply of power e.g use of UPS [Uninterruptible
Power Supply], stand by generators.
Scan all storage media like flash disks using updated anti-virus
18. Give one role of the following ICT specialists
Page 8
ID NUMBER EMPLOYEE NAME DOB TELEPHONE
NUMBER
U01 ARINDA RUTH 03/03/79 07724311224
(a) Which suitable application package might have been used to capture
the information? (01 mark)
Microsoft Acess
My SQL
Oracle
E-mails
E-books
Online tutorials
E-magazine
E-bibles
Page 9
The table below shows specifications of two computers X and Y.
Computer specifications Computer X Computer Y
Processor Intel ® 3.2 Ghz Intel ® 3308Mhz
RAM 1GB 2000MB
Hard disk 4600MB 50GB
Monitor size 19” 15”
a) Which of the two computers would you recommend for a company to buy?
Computer X
c) Which is the least important of the computer specifications given in the table?
Monitor size
ii) Doctors
Monitoring patients
Medical consultation
Telemedicine
Therapy
Simulations
Medical research
Carrying out operations on body parts
Scanning for diseases
Prescriptions of drugs
4a) Give three devices that can be used to transfer files from one computer to another
Flask disk Zip disks
External hard disk Floppy diskettes
Compact disk Memory cards
Digital versatile disk Magnetic tapes
Blue ray disk
b) Explain the following methods of transferring a file from one location to another.
i) Drag
Method of moving a file or folder from one location on the screen to another by use of a mouse
ii) Copy
Method of creating a duplicate of a file or folder
5a) Give three factors a company should consider before buying any storage devices.
Storage capacity
Cost
Safety of media/nature of work to be stored
Compatibility of the media with system-IDE, SATA or USB
Brand/make/durability
Data access speed
6a) Give one use for each of the following computer devices
i) Power supply unit
Some have a fuse to protect the system
Convert AC from mains to DC used by the system
Receive and distribute power to different system parts in required voltages
Alternate power to regional voltage settings (110 or 240V)
Provide protection to user against electrical signals
8a) State two internet based tools that support web based research.
Search engines like Google Online libraries/books like Google books
Web browsers Online encyclopedia like Wikipedia, Encarta
Hyperlinks Gopher
b) Identify three things one would require in order to get connected to the internet.
Any communication hardware like modems, routers, switch, hub
Communication software for browsing
Internet service provider for connection
Physical/wireless connection media
Network operating system
Phone/computer
9) Outline five factors which determine data transmission speeds over the internet.
Nature of material one is trying to access or send-graphics tend to load slowly
Bandwidth
Modem/routing device speed and positioning
Network data traffic at a time
Data transmission media
Environmental factors/natural conditions-rainy, cloud, stormy weather and thunder usually
affect transmissions negatively
Malfunction of computers-hardware problems-poor network card, video card or signal receiver
Computer processor speed
Malware, spyware and viruses-software problems-cookies
Memory available
Computer internet setting
10) Give five factors an organization should consider before choosing a local area
network (LAN) model.
Size of organization: a point to point is ideal for about ten users at a time
Networking budget: where server based networks demand much more money
Needs of the network itself: administrator servers
Level of data security needed: server based network models are more secure
Amount of traffic expected
Nature of business
Level of administrative support
Future needs of the organization-scalability
OR
Switch on the mains
Switch on the UPS or stabilizer
Switch on the system unit and finally switch on the monitor
Power on self test is conducted by the BIOS
Bootstrap loads the OS into RAM
The desktop is activated
b) Give any two measures taken to ensure that computers in a laboratory are safe.
The computers should be properly switched on or off
Avoid illegal connections and disconnections
Avoid exposing computers to heat/direct sunlight
Keep away with bags
Foods and drinks should not be allowed in the computer laboratory
Keep the computers in a dust free environment
The repairs should be done by technical persons
The computers should be connected to the UPS or stabilizer
Keep fire extinguishers to guard against fires
Computers should be allowed to cool down before covering them
Lock the laboratory after use of computers
Use burglar proofing
Install and update antivirus
Have usernames and passwords to access the computers
Setup lightening arrestors to guard against thunder
Use firm tables to hold the weight of hardware
12a) A computer file is made up of a file name and a file extension.
i) What is the purpose of a file extension?
To identify the file type
Helps to organize files
Files can easily be located
Determine which program to open the file
ii) Write down the file extension for a word processed document.
.doc
.docx
14. Indicate True or False against each statement in the table below.
True/false
a) Windows Xp is a graphical user interface operating system TRUE
b) Presentation software supports multimedia TRUE
c) Word processors have formula bars FALSE
d) Backup is to combine the content of two or more files to produce one output file FALSE
e) The disk operating system is menu driven FALSE
17) The table below shows part of a database. Use it to answer the questions that follow.
EMP NO NAME TEL NO SALARY NO OF MONTHS TOTAL PAY
E227008 Betty 0774267820 $700,000 3
E227011 Kintu 0701998142 $400,000 4
c) The formula entered in the design view to determine TOTAL PAY, which is a product of
SALARY and NO OF MONTHS is?
=[salary]*[No. of month] in the form
[salary]*[No. of month] in the query
19) From the given terminologies used for internet and networks below, choose the correct
one to complete each of the statements that follow.
a) The type of internet communication that allows multiple users to exchange messages in
real time is called:
Chat room
b) The type of internet communication that enables individuals to post messages on a particular
topic for others to read and respond to is:
Discussion group
c) The use of multimedia technologies in communication is called:
Videoconferencing
20a) Explain the following terms as used in electronic mail
i) Blind carbon copy (BCC)
Used to hide an e-mail address so that none of the recipients can see whom you have sent the
message
2) Give one reason why a school director would purchase the following equipment for a computer
laboratory.
a) Blower
To regulate excess light from monitors especially CRT monitors so as to reduce eye strain.
c) Air conditioner
3) During a practical examination, students were required to open a blank file and save it as
D:\STUDENT WORK\EOT PRACTICAL\safety.doc
a) State the name of the immediate subfolder in which students must save the file.
EOT PRACTICAL
b) Write the root directory onto which the file must be saved.
D:\ or D:
c) Suggest one example of a computer application the student can use to create the file.
safety.doc or safety
Device D (speakers)
5) Read the statements below and write the words TRUE or FALSE in the spaces provided.
STATEMENT TRUE/FALSE
b) Suggest the most appropriate internet communication service in the following situations:
i) Online meetings between two company employees in geographically separated regions.
iii) Typed views on an on-going online discussion amongst a specific group of people.
7a) Identify any three devices other than computers required to set up a network within a school
environment.
Data communication refers to one computer transferring data, information and instructions to
another computer or other computers on a communications channel whereas networking is the
linking or connecting of two or more computers to share resources.
8a) List any three possible threats to data in a computer networked environment.
9) Given below is a notice which a head girl has typed and intends to pin up on all the notice boards in
the school.
THE REGIONAL SWIMMING GALA
ON 22nd NOVEMBER 2014
FEEE: 5000
REGISTER WITH HEADGIRL
Explain any five word processing features which the head girl would use to enhance the appearance of
the above notice.
10a) Suggest one way in which computers have been made user-friendly for persons that are physically
challenged in the following areas:
i) Without hands
Use of sensors
Braille keyboards or data written in braille
Use of projectors
Audio enabled keyboards
Voice recognition devices for data input
Use of biometric devices instead of typing passwords
b) Give three health issues that may be caused by the prolonged use of computers.
.sys
.doc
.bat
.txt
.tif
12a) State any three operations of the machines cycle of a central processing unit.
Fetching Execution
Decoding Storing
13a) A set of instructions that are arranged in a logical way to run a computer is called:
15) Explain why an organization would prefer to use electronic mail (E-mail) over ordinary mail.
One can send any size of messages just at the cost of a local call.
They can be sent at any time and the results are almost simultaneous because the messages reach
their destinations after a short time.
Electronic mails are highly efficient.
They save a lot of time for example you can present a report at a conference by going to it and
downloading it from the conference.
Saves time, paper, and money compared to the telephone or written letters
The recipient may read the message anytime
Allows you to communicate easily with many people at once
Allows you to thoughtfully compose what you would like to say
Ability to send to multiple recipients at the same time.
It is very easy to send a reply to an e-mail as soon as it is received by using a reply button.
Large files such as spreadsheets and graphics can be sent as attachments
Can be used for advertisements
Assurance of whether the mail has been delivered is given
No use of stamps
Convenient when retrieving and delivering
16) Outline five areas of self-employment that a sub ICT student can engage in.
a) The visual movement from one slide to another slide is slide transition.
b) The animation effects setup the way text/objects appear on a slide during a presentation.
c) The presentation of slides in a sequence on a projection screen is referred to as slide show.
d) The slide layout defines the arrangement of all items that make up a slide.
e) A user can print the entire presentation on one page by printing the handouts.
18a) State one difference between a compact disc (CD) and a digital versatile disc (DVD)
b) Explain the circumstances under which the following storage devices are used.
i) Memory card
When data has to be read from small electronic devices like phones, PDAs and palmtops
When there is a likelihood of making changes to files
When there is need to access files on various electronic devices
When there is need to transfer files from one device to another
When you have a memory card reader
When there is need to access files on various electronic devices with USB ports
When files have to be kept for a long time (quickly and easily backup files)
When more files have to be added from time to time
When there is need create a boot disk
Interpreters are programs that read one of the source language instructions line by line and change
it into machine language when the program is running.
ii) Syntax
iii) Debugging
20) Using the e-mail address: [email protected], identify what these parts stand for:
a) annet
User name
User
User ID
Unique ID
b) @
Symbol that separates the e-mail user name from the rest of the address
c) gmail
Domain name
The service provider
Server name
d) .com
END
1a) Distinguish between Random access memory (RAM) and secondary storage
RAM is the working area for the computer user that provides temporary storage for data, programs when
the computer is running whereas secondary storage is a kind of storage that provides a relatively
permanent for of storage for data and information when the computer is running or even when the
computer is turned off.
a) Field name
Database feature assigned to each field to identify the different fields.
b) Field properties
Determine how data is handled, stored and manipulated
Further define data types and formats like field size, default values
c) Data type
Specify the kind of data a field can contain and how the field is used.
Computer servicing is the caring for a computer to preserve it in a good working condition and to prevent
damage while computer repair is the restoring of a computer to an acceptable condition by removing and
then replacing or mending of damaged parts.
b) Write one reason for having the following items in the computer laboratory.
i) Woolen carpet
Absorbs moisture from the floor
Absorbs sounds from movements
Protects devices from damage when they fall
Protects users from electrocution
Absorbs dust and prevents it from entering the computers
ii) Blower
Removing dust from computer parts
b) A student is typing a document using Microsoft Word. Write down three steps the student will
use to shut down the computer.
Save the document and close the document
Click on the start button
Choose turnoff or shut down
5) State five activities that can be performed on a computer when using a mouse piece.
Pointing at items Zooming windows
Dragging and dropping items Moving the pointer
Clicking Selecting or highlighting items/text
Double clicking Drawing images
Scrolling Creating shortcuts
i) Windows
Readily available on market
Software downloads, patches, fixes are available online
Supports networking
Supports multitasking
Compatible with almost all machines
Interoperable with most software
Easy to use since it supports many interfaces
Easy to learn
Light-takes little disk space
User support readily available online
ii) Linux
Supports networking
Supports multitasking
Interoperable with most software
Compatible with almost all machines
Free of charge
Flexible-users can change the code-open source
Resistant to viruses
b) Show three ways in which the internet can facilitate trade and business.
Facilitates advertising
Facilitates business and trade communication
Facilitates online booking
Traders may pay online
Traders can exchange transaction documents online
Buyers can inspect documents online
10) Show one way in which the internet can be a danger to:
a) Morality
Exposure to pornography and illicit materials
Loss of respect to the elderly
May lead to juvenile delinquency
Young people may learn to take drugs
Decline in cultural norms and values
b) Labour
Loss of man-hours when workers surf at the expense of their work
Workers may do personal research wasting organizational resources
Internet may replace some workers rendering them jobless
Redundancy of workers when the internet connection fails
A lot of trickery and wrong information about jobs over the internet
Facilitates surveillance leading to loss of workers’ privacy
Loss of craftsmanship and creativity due to over reliance on computers
c) System security
Facilitates rapid spread of computer viruses
Illegal access from hackers and crackers
Facilitates phishing and pharming
d) Human security
Facilitates surveillance which leads to loss of privacy
Defamation
Identity theft
Cyber bullying
Cyber terrorism
Impersonation
Abusive and threatening messages
e) Information
b) Versatility
Computers can be used for many different tasks and can change from one task to another.
Computers can be used to perform completely different tasks at the same time or one at a time.
c) Accuracy
Computers are thorough/systematic/orderly once right instructions and data are entered.
Computers are so accurate that they hardly make mistakes.
b) Outline any three ways in which ICT can improve the quality of education.
Through e-learning that links schools and institutions
Through enabling multimedia usage which makes learning interesting
Saves educational costs
Facilitates educational research
Tool for teaching and learning
Enabling sharing and update of notes
Facilitates efficient information processing and communication
b) Study the file path below and answer the questions that follow.
F:\accounts\bursar\fees.xls
i) Identify the file name Fees or fees.xls
b) i) Which type of organization does the domain name of the email user above subscribe to?
Commercial organization
ii) Give any other example other than the one you have stated above.
Military organization (.mil)
Educational organization (.edu)
Networking organization (.net)
Non governmental organisation (.org)
Government organisation (.gov)
A server is a computer that controls resources and responds to requests for resources from other
computers whereas a client is a computer that requests for resources from the server.
ii) Switch
Used to connect network segments and storing the address of every device connected to it
iii) Router
Used to send communication traffic to appropriate network using the fastest available path
18) The table below shows a worksheet which Nabirye was working on. Use it to answer the
questions that follow.
19a) Tick the three utility programs from the list below.
TICK HERE
Web browser
Data compressor
Disk defragmentor
Operating system
Antivirus software
b) State the function of any two utility programs you ticked above.
Disk defragmenter
The disk defragmenter utility reorganizes files and unused space on a computer’s hard disk to access
data more quickly and programs to run faster.
Antivirus utility
An antivirus utility is a program that prevents, detects and removes viruses from a computer’s
memory or storage devices.
Data compressors output a smaller file when provided with a stream or file.
20a) Explain the following terms giving an example in each case
i) Simplex
Data transmission in only one direction
Examples
Television broadcast
Radio broadcast
Keyboard transmission
Pagers
Temperature sensors
Door bell
Examples
Radio call
Fax machines
Credit card verification systems
Automated teller machines
Walkie tokie
TICK HERE
Optic fibre
Bluetooth
Twisted pair
END
UGANDA NATIONAL EXAMINATION BOARD
1. (a) Reasons why mobile phones should not be allowed in secondary school
(b). Description of method of recovering an accidentally deleted folder from the desktop
(a) System unit: Is an enclosure that contains most of the computer components
Is a casing or box that houses the internal electronic components.
(b) Ram chip: A primary data storage device which allows data to be accessed at a high speed
in any order.
A working memory of a computer which stores data temporarily.
(c) Power supply: A device that supplies the required amount of power to all components of a
computer.
It is a computer hardware that converts AC to DC for computer use
(e) Peripheral devices: Electronic equipment or devices connected from outside the computer
and even if removed the computer continues to work.
Components that are attached or removed to increase computer efficiency.
(i) Audio file .MP3, .WMA, .WAV, .FLS, .MP4A, .AUX, .AIF, .AUD, .CDA, AU.
2
(ii) Word documents .Doc, .Docx
Examples Laser jet printer, Deskjet printer, inkjet printer, thermal printer, bubble jet printer
Interpreters
Compilers
Assemblers
Input devices
Output devices
Processing devices
Communication devices
3
9. (a) Public domain software is copyrighted – FALSE
Source codes of open source software programs are only available to paid up subscribers –
FALSE
Shareware programs are widely available from a variety of downloaded sites on the internet –
TRUE
Microprocessor
BIOS chip
Display adapters
Built in VGA
NIC
AGP and PCI expansion slots
Buses
CMOS battery
Heat sink
Transistors
Ports.
(i) Frame: A feature that enables a user to fit in the required text or image of the required
dimension.
4
(ii)Template: A computer document containing basic information that is used as a model for
writing other documents such as business letters, envelopes, etc.
This is a tool having a pre-formatted design styles that can be used in publication to help a user
easily create basic publication.
Adobe illustrator
Microsoft Office Publisher (Ms Publisher)
Adobe PageMaker
Print Master
PrintShop Professional
Siera Print Artist
Coral Draw
Adobe InDesign
Serif page plus
Brochure
Cards
Certificates
Calendars
Posters
Flyers
Banners
Webpage
Newsletter
Word processing Used to create, edit, format, save and print documents
Spreadsheet Used to organize data in rows and columns and also perform calculations
Database Management System Used to organize data in a way that allows to access,
retrieve and make use of that data. Develop and manage database.
5
13. Ways of protecting data and software
14(a).
Unlikely to be lost
Faster to arrive
Allows sending messages to several people at a time
Cheaper in terms of costs involved
Messages can be sent at any time anywhere
Allows sending multimedia format documents
Less prone to illegal access
6
Several documents can be sent at once
(b)
15
(a) Simulation
(b) WIFI
(c) Bluetooth
16. (a) A hyper link is a built in connection to another related page or part of a webpage which
can be a text or image while
A home page is the starting/index/first page of a website which can act as a list/table of contents
or an index page to the website
7
Know where you are in cyber space
Respect other people’s time and bandwidth
Make yourself look good online
Help keep flame wars under control
Respect other people’s privacy
Don’t abuse your power
Be forgiving of other people’s mistakes
Logout or log off your account after use
Forward e-mail messages you receive only with permission of the sender.
Remember you are not anonymous. What you write in an e-mail and web site can
be traced back to you.
Obey copyright laws. Don't use others' images, content, etc. without permission.
Use distribution lists appropriately and with permission.
Do not send SPAM i.e. posting or e-mailing unsolicited e-mail, often advertising
messages, to a wide audience
Microwave
Bluetooth
18
a) Watermark
b) Mail merge
8
c) Indent
d) Bookmark
e) Cursor
d) A modem is a device that translates analog signals to digital signals and from digital to
analog. A combined device for modulation and demodulation
9
UGANDA NATIONAL EXAMINATIONS BOARD
DRAFT MARKING GUIDE 2017
S850/1 SUB-ICT P.1
(b) Reasons why one would require the following in computer laboratory.
(i) Un-interruptible power supply.
- To give time to the user to save his work by supplying power for a few
minutes after power has gone off / is insufficient / unstable
- To safely turn off/shut down the computer.
- To temporarily supply power to enable the user complete work at hand.
Any 1x2=2 marks
(ii) LCD projector.
- To provide a display/show on wider view to the learners.
- To eliminate the use of chalk which can create dust in the laboratory.
- To minimize the electro-magnetic radiations.
Any 1x2=2 marks
2. (a) The procedure for changing the name of an existing file or folder.
- Select/right click the file/folder.
- Select rename/properties from the drop list.
- Type the new name and press enter/click on the icon to confirm.
OR
- Select the folder/file.
- Press F2 on the keyboard.
- Type the new name and press enter to confirm.
OR
- Open the existing file.
- Select ‘save as’ from the file menu/office button.
- Give the file a new name and press enter to confirm.
OR
- Point at the file/ folder name
- Two single clicks
- Give the file a new name and press enter to confirm.
Any 3x1=3 marks
(b) Function of the device driver in a computer system
- They enable computer components communicate.
- They act as an interface between peripheral devices and the computer.
Any 1x2=2 marks
Page | 1
3. Write the following in full.
a) CCTV: Closed Circuit Television
b) ROM: Read Only Memory
c) CAD: Computer Aided Design
d) CPU: Central Processing Unit
e) VDU: Visual Display Unit / Video Display Device
Any 5x1=5 marks
4. (a) Storage devices resistant to virus attacks.
- CD-R
- CD-ROM
- DVD-R
- Blue ray
- DVD-ROM
Any 1x1=1 mark
(b) Describing the following terms as used in computers.
(i) File: A block/collection of related data/information with a name.
2 marks
(ii) Folder: It is a virtual container for files and sub-folders. 2 marks
5. (a) Categories of the components of a computer system.
- Hardware.
- Data
- Software.
- User
- Procedure Any 4x1=4 marks
(b) Function of any one category you have stated in 5 (a).
Hardware can be used for:
- Input of data.
- Output of data.
- Storage of data.
- Processing of data.
- Communication.
Data:
It acts as a raw material for information.
Software:
- Controls/manages the operations of the resources.
- Provides the user interface.
- Guides computer operations.
- Provides security on data.
- Computer error management.
User:
- To instruct the computer system.
- To program the computer system. Any 1x1=1 marks
Page | 2
6. Indicating TRUE or FALSE
(a) FALSE
(b) TRUE
(c) FALSE
(d) FALSE
(e) TRUE
Each 1 mark=5 marks
7. (a) Definition of hardware.
Refers to the physical/tangible component of the computer.
2 marks
(b) Ports used to connect devices on a computer.
- Ethernet port. - SD port
- Ps/2 port - MIDI port
- USB port - Fire wire/1394 port
- Parallel port - Audio ports
- Serial port - SCSI Port
- HDMI port
- VGA port
Any 2x1=2 marks
(c) Devices used to transfer a hardcopy document to a computer.
- Scanner
- Digital camera
- Fax machine (facsimile)
- Smart phone
Any 1x1=1 mark
8. (a) Definition of system software.
System software is a set of programs designed to manage operations of the
computer and avail computer resources to the user
1 mark
(b) Functions of an operating system.
- Allocating system resources.
- Provides user interface.
- Offers data and software security.
- Scheduling computer jobs/tasks.
- Managing computer memory.
- Monitoring system performance.
- Provides platforms for applications to run.
- Establishing network connections.
- Managing booting processes.
- Device management.
Any 4x1=4 marks
Page | 3
9. (a) Distinguishing reading and writing
Reading is a process of transferring data/instructions and information from a
storage medium into memory
While
Writing is a process of transferring data/information from memory to a storage
medium.
For both sides correct. 2 marks
(b) Example for each of the types of storage devices given below.
(i) Optical storage: CD-R, CD-ROM, CD-RW, DVD-R, DVD-ROM, DVD-
RW, Blue Ray
(ii) Magnetic Storage: Hard disk, Floppy disk, Magnetic tape, Zip disk, Jazz
disk.
(iii) Solid State: Memory card, Flash disk
Any 3x1=3 marks
10. (a) Examples of documents created using desktop publishing application.
- Calendar - Adverts - Magazines
- Cards - Newsletter - Posters
- Invoice - Fliers - Web pages
- Brochures - Certificates - Signs
- Label - Book covers - Menu
Page | 4
(b) Measures employed to reduce the network threats.
- Use passwords.
- User account authentication
- User access control levels
- Use anti spyware
- Use antivirus
- Data encryption
- Use firewalls
- Use biometric authentication.
- Use possessed objects e.g electronic cards
Any 2x1=2 marks
12. (a) Naming elements of data communication.
A. Sender/sending device
B. Communication channel/path or transmission medium
C. Receiver/receiving device
Any 3x1=3 marks
(b) Device used to connect A to B
- NIC (Network Interface Card)
- USB card
1 mark
(c) Protocol used to uniquely identify A and C
Internet protocol
1 mark
13. Indicate INPUT or OUTPUT
(A) INPUT
(B) OUTPUT
(C) OUTPUT
(D) INPUT
(E) OUTPUT
Each 1 mark=5 marks
14. (a) Reasons for using electronic application in budget preparation.
- The inbuilt mathematical formula and functions provide quick manipulation of data.
- It has automatic recalculation features.
- It has grid lines therefore no need to draw tables.
- The what if analysis enables predictions and projections to be made faster.
- It provides a variety of graphical representations of data for better analysis.
Any 2x1=2 marks
(b) Use of the following applications;
(i) Presentation software:
- For creating slides to enhance speech.
- Used for making animated graphics for adverts.
- Creating handouts.
Any 1x1=1 mark
Page | 5
(ii) Word processor:
- Used to create letters.
- Used to create memos.
- Used to create a document and send it to multiple people.
- Used to create CVs.
- Used to create reports.
Any 1x1=1 mark
(ii) Communication software:
- It is used to exchange information electronically.
- It is used to create an electronic message.
- It facilitates management of stored E-mails.
Any 1x1=1 mark
15. (a) Example of a presentation software.
- MS PowerPoint
- Lotus Freelance graphics.
- OpenOffice Impress
- Corel presentation
- K-presenter
- Screencast
- Google slides
Any 1x1=1 mark
(b) Importance of the following features;
(i) Master slide:
- It is used to determine the appearance of all slides in a presentation in terms of
format.
2 marks
(ii) Transitions:
- Determine how slides appear/enter and disappear/exit on screen in a presentation.
OR
- Adds animation effects on slides as they appear/enter and disappear/exit on screen during
presentation.
Any 1x2=2 marks
16. (a) Advantages of using E-mail services over sending mail by post.
- Faster delivery of information by E-mail.
- E-mails services are cheaper in term of delivering Information.
- E-mails are more secure since can be protected by passwords.
- E-mails offers immediate feedback to the sender.
- A single E-mail can be sent to multiple recipients at the same cost.
- A single E-mail can be sent to multiple recipients at the same time.
- E-mail is less susceptible/prone to loss.
- E-mail services facilitate management of stored mails.
- E-mail can be sent anywhere at any time as long as there is active network.
Any 3x1=3 marks
Page | 6
(b) Advantages of post-mail services over e-mail communication.
- There are lower chances of eavesdropping with post-mail service.
- Legal documents with original signatures can be sent using post-mail service.
- Physical messages can be sent by post.
- No loss of mail due to virus attack.
- Documents can be tracked during transit.
- Possibility of checking documents before sending, during transit or the
destination for security.
- It is convenient for all categories of people.
Any 2x1=2 marks
17. Examples of networking devices.
- Network Interface Card (NIC)/Network Adaptor
- Modem
- Hub
- Switch
- Router
- Wireless Access Point (WAP)
- Repeater
- Bridge
- Multiplexer
- De multiplexer
- Concentrator/terminator
Any 5x1=5 marks
18. Ways in which students use internet.
- Communication through e-mails, voice over IP, on-line chat, telephony
- Online education through virtual classes,
- Online discussion, forums
- Online research trough Online library/learning materials like text books
- Access to simulated experiments/behaviors.
- Web-based training/assessment.
- Virtual storage/online storage.
- Online collaboration
Any 5x1=5 marks
19. (a) (i) Definition of data transmission media.
- It is a path through which data signals are transferred/conveyed from one point to another.
1 mark
(ii) Examples of transmission media.
- Micro waves - X-rays
- Radio waves - Coaxial cables.
- Infrared rays - Twisted pair cables
- Gama rays. - Fiber optic cable
Any 2x1=2 marks
Page | 7
(b) Services offered by data communication tools.
- E-mails
- News groups
- Chat rooms
- Video conferencing.
- Telecommunication/teleconferencing.
- Instant massaging.
- Telemedicine
- E-learning
- E-commerce
End
Page | 8
1a) List three major specifications one would consider when buying a laptop computer.
Processor speed/power/model/type
Amount of memory installed (RAM)
Hard disk space/amount of storage space
Ability to communicate with other peripheral hardware
VGA capacity
Screen specifications-resolution
resolution and size
Batter life span
Compatibility with software-operating
operating systems
Laptop size
Cold booting refers to starting a computer that had been powered off completely whereas warm booting
refers to restarting a computer that is already powered on or running.
A collection of related technological tools used to create, store, manage and disseminate information.
b) Outline any three measures that can be taken to prevent environmental degradation through the use of
ICT.
Minimize the use of paper by using the internet to send e-mails than physical letters
Through properly recycling, disposing off of e-waste.
Sensitize people about environmental management through social media platforms
Through use of Google maps to spot areas where degradation has occurred so as to mitigate the effect
Through use of television talk shows to sensitize people about environmental management
Through use of radio announcements to disseminate information about environmental management
Through use of pop-up messages sent to phone to alert or remind people about environmental
management
Through use of drone to plant trees, spay, irrigate, put off fire in hard to reach areas
Through use of grid computing
Through use of virtualization of computing hardware
Through use of low power hardware like LCD monitors and laptops
Through use of cloud computing
Through developing bio-degradable computing devices
Switch off hardware when not in use
4a) Give two reasons why file management is important in a computer system
b) State three ways in which one can troubleshoot a computer that has failed to start
Remove/replace/re-fix properly hardware like keyboard, mouse, display device, RAM chips, bus
connections
Start the computer from an external startup disk
Repair the operating system
Remove any external storage media like flash disks at start-up
Ensure the power connections are properly fixed
Ensure the computer is connected to required power voltage amount
Restart the computer to correct any software problems before it completes the boot process.
Run properly recommended system settings
An input device is a device used to feed/enter data and instructions into a computer.
b) Name two basic input devices associated with common desktop computers
Mouse
Keyboard
8) Ali has a DVD full of data and would like to transfer the data to CDs. The capacity of the DVD is
4.7GB and each CD is 700MB. Calculate the number of CDs he would need to transfer all his data.
1 GB =1073741824
1MB =1048576
4.7GB =4.7*1073741824 5046586573
700MB =700*1048576 734003200
5046586573/734003200 = 6.875428571
7 CDs would be needed to store 4.7GB of data
9a) Define the term tailor-made software
Tailor-made software is software designed at a user’s request in order to meet the user’s particular
needs
CPU
Central processing unit
ALU
Arithmetic logic unit Arithmetic and logic unit
Bus
Carries data and instruction between different computing components
Control unit
Registers
Utilities are service programs that enhance the computer system operations whereas application
software refers to software designed to meet the needs of the user.
Hotspot
An ISP is a company that provides Internet connections to individuals and other companies.
Search engine
A program used to find web contents using keywords or leading statements on the World Wide Web.
c) Under what circumstances can someone use a uniform resource locator (URL) in web browser?
Increased productivity
Improved remote access to materials in hazardous areas
Improved monitoring or supervision of industrial activities
Efficient handling of repetitive tasks
Reduced production time making goods available on market in a short time
Reduced accidents
Reduction in cost of production-no need to pay workers
Improved quality of products and range of products
Efficient utilization of raw materials leading to reduction in operational costs
Data communication refers to transferring data, instructions and information to another computer or
some other devices over a channel.
17. For questions a)-e), fill in the missing words from the list below.
19a) Give two situations under which electronic presentations would be used
During teaching
When presenting or addressing a big audience
During advertisements
b) State three advantages of using electronic presentations over traditional chalk and talk
An electronic presentation can be save for future reference compared to traditional chalk and talk
Makes the presentation more interesting due to use of multimedia like animations and transitions
Visual explanations/illustrations are more clear
An electronic presentation is more systematic and precise
An intranet is a network that allows sharing of resources only among members within an organization
whereas an extranet is a network that extends resources to authorized members outside the organization
related to that organization.
A LAN is a network that spans a limited/small geographical area like a building or room.
INSTRUCTIONS TO CANDIDATES:
Each candidate must produce a hard copy for each of their to accompany the
Compact Disc (CD
T
he term ICT is stands for Information and Communication
Technology and is defined as a “Diverse set of technological tools
and resources used to communicate, and to create, disseminate, store,
and manage information”. ICT has become a very important part of
the educational delivery and management processes. ICT largely facilitated the
acquisition and absorption of knowledge and hence providing extraordinary
opportunities to developing countries for enhancing their educational systems
particularly for the under privileged constituency, and thereby raising the level
of quality of life for their people.
(h) Save your work as your name and personal number. (01 mark)
1
2. (a) A school produced an end of term one mark list for senior five; using
any spreadsheet program enter the data in the table below. (04 marks)
(b) Provide a heading for your worksheet as “Kitti Secondary School, Results
for 2012” and center it with font size 24.5. (03 marks)
(d) Apply boarders on the data you have entered in the worksheet. (01 mark)
(e) Insert your name and personal number as footer. (01 mark)
(f) The sheet for the table should be named as Table. (01 mark)
(g) Create a pie chart using the average marks, and include:
(i) The Heading “Senior Five term one marks, Kitti Secondary School”
(01 mark)
(ii) Labels with the chart. (01 mark)
(h) Copy the chart to sheet 2 and name it Chart. (02 marks)
(i) Save your work as your name and personal number. (01 mark)
2 Turn Over
3. Use any desktop publishing software to design a certificate of excellence
for Kiryamenvu Senior Secondary Senior Six (S.6) candidates who
have excelled in the following application packages: Ms Word, Ms
Excel, Ms PowerPoint, Ms Access and Ms Publisher. Provide space for
signatures of the head teacher and head of ICT department. (10 marks)
(a) Adjust the paper size to a width of 11 inches and height of 8.5 inches.
(02 marks)
(b) Insert clip art to represent the owners photograph. (02 marks)
(c) Use your name as the owner of the certificate. (02 marks)
(d) Use your name and personal number in the footer. (02 marks)
(e) Save and print your publication. (02 marks)
Input devices:-These are any hardware components used to enter data and
instructions into a computer system. E.g .Keyboard
Storage devices:- These are used to record and retrieve data to and from a
storage medium in the computer system. They can be either internal like the
3
HDD, or external like a CD. Storage devices have got their specialized drives
through which data can be written or read. For example, data on a CD can be
read with the help of a CD or DVD drive.
Conclusion:
Whereas the above devices are standard input-output devices, some other
devices are referred to as computer peripherals. Computer peripherals are any
electronic devices that can be hooked to a computer. Examples of peripherals
include speakers, microphone, printers, scanners and digital cameras.
Tasks
(a) As a senior six Subsidiary ICT student prepare a four slide presentation
for the S.2 learners summarizing the information given above.
(08 marks)
(b) Save the presentation with your name. (01 mark)
(c) Insert a header as your name and personal number. (01 mark)
(d) Change the background of all slide titles to an appropriate style.
(01 mark)
(e) Set the slide transition of your choice, with transition time of 6 seconds.
(02 marks)
(f) Set animations of your choice for all slide titles and other parts of the
slides. (01 mark)
(g) Make use of speaker’s notes and relevant graphics. (02 marks)
(h) Insert a summary tabular slide between the last slide and second last
slide with the following data. (03 marks)
Summary table:
NO DEVICE HARDWARE CATEGORY
1 Keyboard &Mouse Standard Input device
2 Monitor Output device
3 CPU Processing device
4 Hard Disk Storage
5 Speakers, Microphones, printers, scanners, peripherals
and digital cameras
4
Turn Over
5. The table below shows medical records of a certain clinic
END
5
S850/3
Subsidiary ICT
(PRACTICAL)
Paper 3
Nov./Dec.2013
2 hours
INSTRUCTIONS TO CANDIDATES:
Each candidate must produce a hard copy for each of their to accompany the
Compact Disc (CD
1. (a) Open a word processing software and type the document below as it
is. Save it as Sub-ICT. (07 marks)
Introduction
This syllabus was developed after looking at the need for Information and
Communication Technology (ICT) knowledge and skills among learners and
how these help to improve on the teaching-learning process. The education
sector and the world of work require an individual to possess ICT knowledge
and skills. This is evidenced by the demand for computer literacy and computer
skills for respective job vacancies being advertised today.
This syllabus has been prepared to help the learner acquire ICT knowledge and
skills required to meet the challenges of ICT applications in society. The
syllabus emphasizes use of practical examples whenever possible to teach ICT
applications which the world of work expects a high school graduate to possess.
The subsidiary ICT syllabus is meant to help the learner acquire skills required
by end users of ICTs and which can be applied in a variety of fields.
(d) Make the first letter of paragraph 2 a Drop cap of three lines. (02 marks)
(e) Insert a footnote “we are ready to move with ICT” on the word ICT
paragraph 1. (02 marks)
(g) Insert the current date and right align it. (02 marks)
(h) Insert your name and personal number as header. (01 mark)
1
2. In this question, you are going to be working with a template developed
by a certain canteen manager of your school.
Study the template and the additional information given below.
(b) Determine the canteen VAT TAX, PROFIT, and ITEM EXPENSES for
(c) Determine the COST PRICE for each item. (01 mark)
(d) Determine the total amount for each column. (01 mark)
(e) Assuming the budget was read dropped the item prices by 10%;
(02 marks)
2 Turn Over
(i) Insert a column NEW ITEM PRICE at the end of the table
(ii) Determine the new item price for each item.
(f) Let your figures be formatted to UGX currency symbol. (02 marks)
(g) Represent the ITEMS, ITEM PRICES, and NEW ITEM PRICES on an
(h) Insert a centred header of your name and personal number in the
worksheet. (01 mark)
(i) Name your worksheet as Income Statement. (01 mark)
3
3. (a) Using any publication software, design a business card using details
below. (05 marks)
4
Turn Over
4. You have been to sensitize the public about the introduction of Subsidiary
ICT at A-level.
(a) Use presentation software to deliver your presentation with the following
content:
(i) Slide 1: A presentation title in word art format and you as the presenter.
(02 marks)
(iii) Slide 3: Use bullets to outline the reasons for studying the subject.
(03 marks)
(v) Slide 5: Present the first two columns of the table above on a column with a
slide title. A GRAPH REPRESENTING MY SENIOR FIVE ICT MARKS.
(04 marks)
(b) Use relevant images and colors to enhance your presentation. (01 mark)
(c) Add a header and footer as your name and personal number respectively.
(02 marks)
(e) Save your presentation as your name and personal number respectively.
(01 mark)
5
5. The table below represents Kagali Secondary School student’s data.
END
6
S850/2
Subsidiary ICT
(PRACTICAL)
Paper 2
Nov./Dec.2014
2 hours
INSTRUCTIONS TO CANDIDATES:
Each candidate must produce a hard copy for each of their to accompany the
Compact Disc (CD
1. (a) Using a word processor of your choice, type the document below
using Comic Sans Ms font style. Save it as Reading Lesson 1.
(05 marks)
Jack is a young lad living with his widowed mother. Their only means of income is
a cow. When this cow stops giving one morning, Jack sent to the market to sell
it. On the way to the market he meets an old man who offers to give him “magic”
beans in exchange for the cow.
Jack takes the beans but when he arrives home without any money, his mother
becomes angry and throws the beans to the ground and sends Jack to bed
without supper.
(b) Copy all the text and past it in a new blank document. Save it as Reading
Lesson 2. (01 mark)
(c) Include heading JACK& THE BEAN STALK and format it to size 28.
(02 marks)
(d) Change the spacing for all paragraphs of text to 1.5. (01 mark)
(e) Insert an auto shape of a face in the middle of paragraph 1. (01 mark)
Wrap text around it Tight. (01 mark)
Resize it to height of 0.47 inches and width of 0.68inches. (01 mark)
(f) Insert a page break below the last paragraph. (01 mark)
(g) On page 2, use a table of 7 rows and 3 columns to design your class time
table. (02 marks)
(h) Modify the table in (g) and make it appear like the one below. (03 marks)
(i) Insert a header of your name and personal number. (01 mark)
1
2. There will be a “Science and Technology Exhibition” in your school on 15th
May next year. The ICT club has been chosen by the school administration to
organize a team and suitable materials which will market the school at this
exhibition. You have been selected to head this team.
A title slide outlining basic information about your school. (02 marks)
2 Turn Over
LEVEL SUBJECTS
O-LEVEL Computer Studies, CRE, English, History, Biology, Physics,
Chemistry, Fine Art, IRE, Luganda, and Political Education.
A-LEVEL Science subjects[Chemistry, Biology, Physics, Mathematics,
Agriculture, and General Paper/Sub-ICT/Sub-Mathematics]
Arts subjects [History, Geography, CRE, IRE, Luganda, and
General Paper/Sub-ICT/Sub Mathematics]
Use the title The ICT Club Members from 2008-2010 and a chart slide
layout. (02 marks)
The table below shows enrollment figures for the O-level ICT members
from 2008 to 2010. Use it to generate the chart that will appear on this
slide. (02 marks)
Class 2008 2009 2010
S.1 100 170 140
S.2 120 200 60
S.3 150 70 50
S.4 160 90 150
(b) Insert a footer of your name and personal number on each of the slides.
(01 mark)
3
3. (a) Using suitable database management software, create a database and name
it Student’s Bio Data. (01 mark)
Student Surname Other Date of Place of Sex Next Class Status Termly
ID Name Birth Birth of kin Fees
ST001 Kawa Fred 01/05/1990 Luwero Male Maje S5 Boarding 515,000
ST002 Kaye Sharif 05/02/1995 Wakiso Male Bute S1 Day 195,000
ST003 Logose Mary 17/09/1994 Mbale Female Site S5 Boarding 515,000
ST004 Bata Bena 20/06/1997 Kabarole Female Ville S3 Boarding 415,000
ST005 Obote Bonny 13/04/2000 Gulu Male Opeta S2 Boarding 390,000
ST006 Mane Abou 12/03/2002 Lira Male Obina S1 Boarding 455,000
(b) Create a table with appropriate data types and use it to enter the data in the
table. Name it Student’s Data Table. (06 marks)
(c) (i) Create a form displaying the following fields: Student ID, Surname,
Other Name, Sex and Status. Save it as Identity Form. (02 marks)
(ii) Insert your name and personal number in the form footer. (01 mark)
(d) Create a query displaying the following fields: Student ID, Surname,
Other Name, Class, Termly Fees and Yearly Fees. (Hint: Yearly Fees Equals
Termly Fees times three). Save the query as Totals Fees Query. (03 marks)
(e) Create a query to extract all students born after the year 1994 and before the
year 2000. Name it Birth Date Query. (03 marks)
(f) (i) Create a report displaying the following fields: Student ID, Surname,
Other Name, Date of Birth, Termly fees and Yearly Fees, sorted in ascending
order. Give your report a title School End of Year Report. (02 marks)
(ii) Insert your name and personal number in the Report Footer. (01 mark)
4
Turn Over
4. Your elder sister plans to make a birthday party for her daughter. You have
been assigned to design an Invitation Card for the guests.
(a) Using appropriate publishing software, create an invitation card that fit on an
A5 landscape page. (02 marks)
(b) (i) Use WordArt to write the main subject of your invitation as
“CRYSTAL’S BIRTHDAY PARTY”. (01 mark)
(iii) Use an appropriate fill colour for the WordArt text. (01 mark)
(c) Using text boxes, personal creativity and design skills, appropriately layout
the text below on the rest of the card area. (06 marks)
(e) Insert a header of your name and personal number. (01 mark)
Use appropriate fill colour for both auto-shape and number. (02 marks)
5
5. (a) Open an appropriate spread sheet software and enter the data shown in the
table below. Save it as your name and personal number. (06 marks)
(i) In the TOT column, calculate the total score for each student. (02 marks)
(ii) In the AVE column, calculate the average score for each student. (02 marks)
(iii) In the Highest score row calculate the highest score per subject, the total
score and average score. (02 marks)
(iv) In the Lowest score row calculate the lowest scores per subject, total score
and average score. (02 marks)
(c) Create a suitable title for the table in spread sheet. (01 mark)
(d) Introduce a GRADE column after every subject and use the VLOOKUP
function to assign a correct grade for each subject to the table below. (04 marks)
MARK GRADE
00-34 F9
35-39 P8
40-44 P7
45-49 C6
50-54 C5
55-59 C4
60-69 C3
70-74 D2
75-100 D1
END
6
S850/3
Subsidiary ICT
(PRACTICAL)
Paper 3
Nov./Dec.2014
2 hours
INSTRUCTIONS TO CANDIDATES:
Each candidate must produce a hard copy for each of their to accompany the
Compact Disc (CD
(b) Copy and paste the text to the next page of your document. (01 mark)
(c) Change the heading to uppercase, font size of 16.5 and center it. (03 marks)
(d) Insert the footnote; “Is the provision of telephone services to phones which
may move around freely rather than stay fixed in one location” on the word
telephony. (02 marks)
(e) Insert your name and personal number as header. (01 mark)
(f) Insert the word “Telecommunications” as a watermark with font size 54.
(03 marks)
(g) Include page numbers whose format is alphabetical letters. (02 marks)
1
2. (a) As a treasurer to your school’s Debating Club, use a spreadsheet software
to prepare the budget below. Save your work as your name and personal
number. (06 marks)
(iii) DISCOUNTED PRICE that the club will pay. (02 marks)
(c) Represent the items with their respective discounted prices on a pie chart.
Save it on another sheet. (05 marks)
(d) Insert your name and personal number as footer. (01 mark)
2 Turn Over
3. The table below shows some of the participants in an ICT youth conference
in Uganda.
(a) Use any database management software to create a database called ICT
Youth. (01 mark)
(b) Create a table with appropriate data types and populate it using the data
above. Save it as ICT Youth table. (07 marks)
(c) Generate a form from the table. Save it as ICT Youth Form. (03 marks)
(d) Use a query to filter out all the youths excluding those from the Insurance
DEPARTMENT. Save it as ICT Youth Query. (04 marks)
(e) Use the table to generate a report for the participants. Save it as ICT Youth
Report. (03 marks)
3
4. Many people world over time, have tried to explain how important time is.
Many definitions have been given illustrated below;
Time is a resource.
Time is money
Time wasted is never gained and many others
(a) You are required to prepare a 4-slide presentation to students advising
them on time management. (08 marks)
(b) Insert a link to www.google.com on the third slide and name it
“research”. (02 marks)
(c) Insert a self-updating time on each slide in your presentation. (02 marks)
(d) Insert relevant images to your presentation. (02 marks)
(e) Apply slide transitions to all your slides. (02 marks)
(f) Apply animations to the same of the presenter in the first slide.(02 marks)
(g) Save your work as your name and personal number. (01 mark)
(h) Print your work. (01 mark)
4
Turn Over
5. (a) Using a publishing software, design an identity card with the following
information below. (14 marks)
Telephone: 0413556887
ID Number: 2014/115
END
5
S850/2
Subsidiary ICT
(PRACTICAL)
Paper 2
Nov./Dec.2015
2 hours
INSTRUCTIONS TO CANDIDATES:
Each candidate must produce a hard copy for each of their to accompany the
Compact Disc (CD
1. (a) Type the text below using an appropriate word processing program.
(04 marks)
The stocks and the Urchin
Of all the boys in the town, the most forward in singing nonsensical verse was
always the same on who had begun teasing the storks, a little urchin not
more than six years old. The young storks, indeed, fancied him a hundred
years old, because he was bigger than either their father or mother and what
should they know about the ages of children, or grown-up human beings!
All their schemes of ravages were aimed at this little boy; he had been the
first to tease them, and he teased them still. The young storks were highly
excited about it, and the older grew less they were inclined to endure
persecution. Their mother, in order to pacify them, at last promised that they
should be revenged, but not until the last day of their stay in that place.
Hans Christian Andersen
(b) Copy and paste this document to the next page. (01 mark)
(c) Change the heading to upper case, font comic sans ms, underline it with a
dotted line and font size 13. (03 marks)
(d) Justify the whole document. (01 mark)
(e) Change the line spacing for paragraph one to 1.5. (01 mark)
(f) Drop cap on two lines the letter beginning paragraph one. (01 mark)
(g) Create a footnote of the word “pacify” and it should have the statement “to
calm somebody who is angry”. (02 marks)
(h) Your name and personal numbers should appear as footer and in italics.
(02 marks)
(i) The name “Hans Christian Andersen” should be crossed through. (01 mark)
(j) Highlight the word “scheme” with colour yellow. (02 marks)
(k) Save this document as “Prose” (01 mark)
(l) Print your work. (01 mark)
1
2. The table below shows examination results of senior six students of
Mugo Secondary School. Study it and answer the questions that follow.
(a) Enter the student’s data above in a spread sheet application as shown.
(07 marks)
(b) Using appropriate functions, determine the:
(i) Average score for each subject. (02 marks)
(ii) Highest score for each subject. (01 mark)
(iii) Lowest score for each subject. (01 mark)
(iv) Median score for each subject. (02 marks)
(c) Make your worksheet landscape page orientation. (01 mark)
(d) Name your worksheet as Results. (01 mark)
(e) Use the relevant function to grade each student’s average by indicating:
(03 marks)
Very good if average is greater than 80.
Good if average is greater than 55.
Poor if average is below 55.
(f) Save your work as your name and personal number. (01 mark)
(g) Print your work. (01 mark)
2 Turn Over
3. Titus is the new Marketing Manager of a company called “Inspirational
Aspirations Ltd”. The company is located at block 110, 7th street of
industrial area. The contact address is P.O Box 130, Nakasero. His email
address and telephone contacts are
[email protected] and +256414285193
respectively.
Using a desktop publishing application of your choice, help Titus to come
out with a designer “Business Card” through the following activities.
(a) Use an appropriate design to make eight identical cards per page.
(02 marks)
(b) Save your publication as “your name”. (01 mark)
(c) Using a ruler guide measure, take the following card dimensions-
width 3.5 inches and height 2 inches. (02 marks)
(d) Design one card with following details. Company logo of your choice,
Company Name; Name of employee; Designation; Location; Contact
Address; Email and Telephone contacts. (10 marks)
(e) Select all the contents on the card and group them into one object.
(02 marks)
(f) Apply an appropriate background colour to your card. (01 mark)
(g) Insert your name and personal number as a footer. (01 mark)
(h) Save and print out a copy of your work. (01 mark)
3
4. (a) Create a five-slide presentation about the introduction of Subsidiary
Information and Communication Technology (ICT) for A-level in Uganda.
In your presentation do the following:
(i) Slide I: Include the title “Report on the Introduction of Subsidiary ICT”.
(02 marks)
(ii) Slide II: State the reasons why Subsidiary ICT was introduced in Uganda.
(02 marks)
(iii) Slide III: Give the expected outcomes of studying Subsidiary ICT.
(02 marks)
(iv )Slide IV: List the problems that are faced in schools offering Subsidiary
ICT. (02 marks)
(v) Slide V: Make a conclusion thanking the Ministry of Education, Science,
Technology and Sports for introducing Subsidiary ICT to the Curriculum of
Uganda. (02 marks)
(b) Use appropriate transition schemes to view your presentation. (01 mark)
(c) Use appropriate animation schemes to view your presentation. (01 mark)
(d) Rehearse time your presentation with an appropriate timing of your choice.
(01 mark)
(e) Loop your presentation continuously. (01 mark)
(f) On the title slide apply a clip of the picture of a computer. (01 mark)
(g) The title should have the font size of 43.9, and it should appear different
from other slides. (01 mark)
(h) All the slides should bear a footer of your name and personal number except
the title slide. (01 mark)
(i) Apply appropriate colours for each slide. (01 mark)
(j) Save your work as your name and personal number. (01 mark)
(k) Print your work. (01 mark)
4
Turn Over
5. The table below represents SD employee payroll. Study it and answer the
questions that follow.
ID EMPLOYEE SEX AGE DEPARTMENT BASIC ALLOWANCE
NUMBER NAME SALARY S
U12 ASIIMWE F 52 COMPUTER 300000 20000
RUTH
U13 TUGUME M 41 HISTORY 620000 32000
RONALD
U14 TUGUME M 43 ECONOMIS 320000 50000
ROBERT
U15 NAMBI F 36 MATHS 450000 62000
TRACE
5
S850/3
Subsidiary ICT
(PRACTICAL)
Paper 3
Nov./Dec.2015
2 hours
INSTRUCTIONS TO CANDIDATES:
Each candidate must produce a hard copy for each of their to accompany the
Compact Disc (CD
1. (a) Study the document below and answer the questions that follow.
I
n word processing program such as Ms word, there are numerous options
available for presenting your text. This part of the tutorial will guide you through
several of the important features in word that will allow you to edit, modify and
display text (and non-text) components.
Word allows all toolbars to be customized, so you may not find all options
listed there. There are several buttons that may or may not appear immediately
in your version of Word.
1
(b) Using a word processor of your choice typeset the above document as it is.
(12 marks)
(c) Save your work as Formatting Exercise. (01 mark)
(d) Copy your document to the next page. (01 mark)
(e) Format your copy as follows:
(i) Apply colour green to the title of the document. (01 mark)
(ii) Set the line spacing of the last paragraph to 1.5 points. (01 mark)
(iii) Bullet the list of Standard Toolbar buttons. (01 mark)
(iv) Justify your text in the first paragraph. (01 mark)
(f) Insert a footer of your name and personal number. (01 mark)
(g) Print your work. (01mark)
2
Turn Over
2. The table below shows examination results of Senior Six Subsidiary ICT
students. Study it and answer the questions that follow.
(a) Enter the student’s data above in a spreadsheet program. (05 marks)
(b) Determine the final mark for every student by use of a formula. (02 marks)
(c) At the end of the table in the empty row after Akiiki Lucy, insert a
formula/function in the “AGE” column, to determine the age of the
youngest student. (02 marks)
(d) Insert in the table the title “STUDENT’S PERFORMANCE”. (01 mark)
(e) Insert a footer as your name and personal number. (01 mark)
(f) Plot a bar graph of the FINAL MARK against STUDENT’S NAME.
(i) Add a chart title as BAR GRAPH REPRESENTING STUDENT’S
PERFORMANCE.
(ii) Add axis titles. (05 marks)
(g) Copy your graph to another worksheet. (01 mark)
(h) Rename sheet one as MARKS and sheet two as GRAPH. (01 mark)
(i) Save your work as your name and personal number. (01 mark)
(j) Print your work. (01 mark)
3
3. Use publication software of your choice to design a library brochure of
Katale Secondary School. In your design, take into account the following.
(a) Divide the page into three identical parts. (06 marks)
(Your layout should look like this)
Panel Two
Library Regulations School Address Face of the Brochure.
(b) Make a brief introduction about the library in two sentences. (02 marks)
(c) List five text books of your choice in the stock of text books. (02 marks)
(d) Give at least two library services. (02 marks)
(e) Outline at least two library Regulations of your choice. (02 marks)
(f) For the address use: (01 mark)
Katale Secondary School
P.O Box 1294, Gulu-Uganda
www.katalesecasch.ac.ug
(g) The face should have the heading as KATALE SECONDARY SCHOOL
LIBRARY. Centre the heading with font size 26.5. (02 marks)
(h) Add a clip art object of your choice in the place of the logo. (01 marks)
(i) Save your work with your name and personal number. (01 mark)
(j) Print your work. (01 mark)
4
Turn Over
4. Your teacher requested you to design a five-slide presentation of the topic
of networking which should be used for conducting a lesson in the Senior
Five Class.
(a) (i) Slide 1: Should have the introduction of the topic and the name of
the presenter. (02 marks)
(ii) Slide 2: Should have the advantages of networking computers.
(02 marks)
(iii) Slide 3: Should have the disadvantages of networking computers.
(02 marks)
(iv) Slide 4: Should have the factors affecting communication speed
on the network. (02 marks)
(v) Slide 5: Should have the hardware and software requirements for
networking. (02 marks)
(b) Apply minimal animations in your presentation. (02 marks)
(c) Insert relevant clip art in your slide. (01 mark)
(d) Insert your name and personal number as footer. (01 mark)
(e) Vary the background of all slides. (01 mark)
(f) Number all your slides. (01 mark)
(g) Make your presentation to run automatically after 3 seconds.
(02 marks)
(h) Save your work as Networking. (01 mark)
(i) Print your work. (01 mark)
5
5. The tables below were extracted from records of a school in Uganda.
Study them and perform the required tasks.
Table 1: Subject Table.
6
S850/2
SUBSIDIARY ICT
(PRACTICAL)
PAPER 2
Nov./Dec.2016
2 hours
INSTRUCTIONS TO CANDIDATES:
Each candidate is provided with support files in the folder UNEB Support
Files on the Computer Desktop. Use the support files where applicable to
supplement the questions.
Each candidate must produce a hard copy for each of their to accompany the
Compact Disc (CD)
1. a) Using a word processor application, load the file OUR FOCUS.rtf and
save it as your name and personal number. (02 marks)
(b) Set the page size to A4. (01 mark)
(c) (i) Set the title and subtitles to Times New Roman font size 22 and the
rest of the text to Times New Roman font size 12. (02 marks)
(d) Apply another colour to the title and sub-titles. (01 mark)
(e) (i) Type a sentence related to the title in the Text box at the bottom.
(01 mark)
(ii) Move the Text box to any space in the main document. (02 marks)
(f) (i) Change the numbered list to a bulleted list. (01 mark)
(ii) Use the correct symbol for R registered trademark (02 marks)
(g) Insert an endnote in reference to the title with the words. (02 marks)
“This document here is very important for all”
(h) Insert the image from the file Academician.jpg into your document.
(01 mark)
(i) Insert your name and personal number in the header and align it left.
(02 marks)
2
2. The statistics shows the rainfall in millimeters (mm) received in Kisoro
district in 2012:
(ii) Insert a suitable title for the graph and label the axis. (02 marks)
(e) Insert your name as header and personal number as the footer. (02 marks)
3
3. You have been asked to prepare a presentation about Agriculture in Uganda.
-A folder called Picture part1 contains all the relevant pictures to be used
in the presentation.
(a) Use this data to prepare a four-slide presentation and save it as your
name and personal number Use Title and Content slide layout on all the
slides. (02 marks)
(i) Slide 1: Information about the presenter and the topic. (02 marks)
(b) Every slide should have a relevant image in the bottom right corner.
(02 marks)
(e) Use action buttons in the left bottom corner. (02 marks)
(f) Insert a footer of your name and personal number. (01 mark)
(g) Save and print all your slides as handout on one page. (01 mark)
4
4. Use Database software of your choice, to open the file SPORTS
CLUB.mdb and save it as your name and personal number. (02 marks)
(a) (i) Assign Lookup data type to the field HOUSE.
(ii) Allocate appropriate data types to the other fields. (04 marks)
(b) Enter the data in the field HOUSE against the respective names as
shown in the table below: (02 marks)
NAME HOUSE
Kiconco Enid Muteesa
Mukyala Jenifer Mandera
Nakabugo Tricica Mandera
Nantongo Tania Muteesa
Ttenda Katrina Mandera
Ddumba Stevo Muteesa
Kitonsa Mike Kabalega
Kizimula Willy Kabalega
Omoni Jimmy Kabalega
(c) Sort in ascending order the data based on the FEES field. (02 marks)
(d) Create a form with all the fields in the table and call it Sports Form.
(03 marks)
(e) Create a query and use it to extract all female students whose contacts
start with 077 and 078. Name it Sports query. (03 marks)
(f) Generate a report from the form Sports query. Name it Sports Report.
(03 marks)
(g) Save and print your work. (01 mark)
5
5. Nalongo Secondary School is preparing to host old students for the
annual feast on 17th December at the school. You as the General
Secretary of the old Student’s Association, you are required to design an
Invitation card for the Old students.
(a) Use a suitable Publishing software to design the card and include the
following signatories at the bottom: (10 marks)
(i) Head teacher
(ii) Chairperson
(iii) General Secretary (type your name)
(d) Produce 3 copies of the card which can fit on the same page. (02 marks)
(e) Save your work as your name and personal number. (02 marks)
END
6
S850/3
SUBSIDIARY ICT
(PRACTICAL)
PAPER 3
Nov./Dec.2016
2 hours
INSTRUCTIONS TO CANDIDATES:
Each candidate is provided with support files in the folder UNEB Support
Files on the Computer Desktop. Use the support files where applicable to
supplement the questions.
Each candidate must produce a hard copy for each of their to accompany the
Compact Disc (CD)
1
Answer any three questions on this paper
1. (a) Using word processing software, load the file moralpaper.docx and
save it as your name and personal number. (02 marks)
(i) Drop cap the first letter of the second paragraph to cover 2 lines.
(02 marks)
(j) Make the word “addictive” in the fourth paragraph a hyperlink to
www.google.com . (02 marks)
2
2. (a) Load a file called Products.xls and save it as your name and personal
number. (02 marks)
(b) Add three columns TOTAL COST, TOTAL SALES and PROFIT
after the last column. (01 mark)
(j) Copy all the data on Shop1 to sheet 2 and rename it Shop2.
(01 mark)
(k) Using the data on shop2, filter it to show only products whose profit
exceeds$100,000. (02 marks)
3
3. The Director of Studies (DOS) of a school wishes to improve efficiency
in his office by designing a database for his students.
(a) Use a Database Management Software to design the student database
and save it as your name and personal number. (01 mark)
(b) Create the table given below and save it as Student Data Table.
(05 marks)
(c) Create another table with the data below and save is as Student
Clearance Table. (04 marks)
(f) Create a report showing Name, Class, Lib-Status and Fees Bal. Save it as
Clearance Report.
4
(i) Group your records by Class.
(ii) Arrange your records in ascending order of Names.
(iii) Include a report footer of your name and personal number. (04 marks)
(g) Create a query for Student Clearance Table and in it, calculate TOTAL-
BAL which is the sum of Fees-Bal and Oth-Debts. Save it as Total Debts
Query.(02 marks)
5
5. (a) Using any desktop publication software of your choice, create the
document below as it. (05 marks)
(b) Insert text from the file WASH.rtf into the appropriate auto shapes.
(03 marks)
(d) Fill shapes and background with light colours of your choice.
(03 marks)
(e) Enhance the arrows connecting the auto shapes with a 3pt weight size.
(02 marks)
(f) Insert the picture from the file NO GERMS.rtf in the title text box.
Resize the picture to fit in the textbox. (03 marks)
6
S850/2
Subsidiary ICT
(PRACTICAL)
Paper 2
Nov./Dec.2017
2 hours
INSTRUCTIONS TO CANDIDATES:
Each candidate is provided with support files in the folder UNEB Support
Files on the Computer Desktop. Use the support files where applicable to
supplement the questions.
Each candidate must produce a hard copy for each of their to accompany the
Compact Disc (CD) .
(b) Make a copy of the table onto the next page. (01 mark)
(c) Sort the records in the table in descending order of Salary. (01 mark)
(d) Italicize the column headings and change them to font size 15. (02 marks)
(e) (i) Add a row at the bottom of the table.
(ii) Use in-built formulae to the average age and total salary. (02 marks)
(f) (i) Insert a column to the right of the table and merge cells.
(ii) Type the text “Salary is paid on 28th day of every month without fail”
and align it vertically in the center. (03 marks)
(g) Insert a row at the top of the table and insert a suitable heading. (02 marks)
(h) Align your table in the centre of the table. (01 mark)
(i) Insert a header containing your name and personal number in capital letters.
(02 marks)
(j) Save and print your work. (01 mark)
1
2. In this era of Information Technology, youth are vulnerable to many
challenges in their life. Assuming you are appointed health prefect of
your school and you are required to make awareness about abstinence;
a) Use a suitable presentation software to design a five-slide presentation
about abstinence and include the following information.
i. Slide 1: The topic, your name and current automatic date. (03 marks)
ii. Slide 2: Introduction and definition of abstinence. (02 marks)
iii.Slide 3: Advantages of abstinence among the youth. (03 marks)
iv.Slide 4: Youth affected by early sex in 2009-20%, 2010-30%, 2011-27%,
2012-33%, 2013-35%. Represent the data in a tabular form. (03 marks)
v. Slide 5: Use a column chart to represent the data in slide four.
(03 marks)
b) Insert relevant graphics in your presentation. (02 marks)
c) Apply a suitable animation to your presentation. (01 mark)
d) Insert a footer as your name and personal number. (01 mark)
e) Save your presentation as your name and personal number. (01 mark)
f) Print your presentation as handout on one page. (01 mark)
2
3. (a) Using an appropriate database program, load the file POPU. Save it as
your name and personal number. (02 marks)
(b) Open the table “Nation” in Design View and adjust the data types
appropriately. (04 marks)
(c) Enter the following details in the field IDNo. (02 marks)
N001 N002 N003 N004 N005 N006 N007 N008 N009 N010
N011 N012 N013 N014 N015 N016 N017 N018 N019 N020
(d) Delete the default ID field from the table and make IDNo the primary
key. (02 marks)
(e) Create a query including the fields od NAME, SEX and MARRIAGE
to select all those female citizens who are not married. Save the query as Status.
(02 marks)
(f) Make another query with only the concerned fields to display families living
in semi-permanent houses and having the number of members in the family
which is 12 and above. Save it as Semi Permanent. (03 marks)
(g) Produce a report showing all fields except the fields; DATE OF BIRTH and
MARRIGAE STATUS. Save it as Final Report. (02 marks)
(h) Insert a footer as your name and personal number on the report. (01 mark)
(i) Save and print your work. (02 marks)
3
4. (a) Use a publication software to open the file phone.pub and save it as
your name and personal number. (02 marks)
(b) Insert a text box of height 0.791” and width 8.936’’ on the top most part of
the page and do the following; (01 mark)
i. Type “YUNNO SENIOR SECONDARY SCHOOL” (01 mark)
ii. Change the font type to Rockwell condensed size 28 and any color.
(02 marks)
iii. Insert a logo of your choice in any appropriate position of the text box.
(02 marks)
(c) (i) Insert any two pictures from the folder images, in the positions labelled
No1 and No2. Resize the pictures to fit in the text boxes. (02 marks)
(ii) Type “Invitation to silver jubilee celebrations” between the two images and
change the font type to Old English Text MT size 24. (03 marks)
(e) Type the following text in the area marked Z and centre align it. (03 marks)
Dear
Mr/Mrs/Rev/Hajji……………………………………………………………
You are hereby invited to attend the schools silver jubilee celebrations due
to take place on 15th December this year at 10:00am at the school’s
Rwakanengyere square.
(f) Type in your name as the recipient of the invitation. (01 mark)
4
5. (a) Using any spreadsheet program, load the file Data which shows the
number of votes obtained by Chairperson Local Council five (LCV)
candidates in different counties of a district. Save your work as your
name and personal number. (02marks)
(b) Add two columns: TOTAL and POSITION. (01 mark)
(c) Using any relevant formula, calculate:
i. Total votes
ii. Position
(d) Skip one row after the last candidate and type the word Highest Votes.
Calculate the highest number of votes for each county. (02 marks)
(e) In the next new row, type the word Total Voters. Calculate the total number
of voters per county. (02 marks)
(g) (i) Insert two rows above the first row. (01 mark)
(ii) Type an appropriate heading for the table and centre it. (01 mark)
(h) Insert a 2D stacked line chart for all candidates and their votes in the
countries EXCEPT county C. (02 marks)
(i) Add an appropriate chart title and axis titles. (02 marks)
(k) Insert a header of your name and personal number. (01 mark)
5
S850/2
Subsidiary ICT
(PRACTICAL)
Paper 3
Nov./Dec.2017
2 hours
INSTRUCTIONS TO CANDIDATES:
Each candidate is provided with support files in the folder UNEB Support
Files on the Computer Desktop. Use the support files where applicable to
supplement the questions.
Each candidate must produce a hard copy for each of their to accompany the
Compact Disc (CD) .
1. (a) Using a word processing software, open the file document xy and
save it as your name and personal number. (02 marks)
(b) Underline the heading with a dotted line. (01 mark)
(c) Drop cap by three lines the first paragraph. (02 marks)
(d) Convert two into two columns with a line in between them.
(02 marks)
(e) Insert page numbers, center aligned in the A, B, C format.
(02 marks)
(f) Insert an appropriate watermark of size 38. (02 marks)
(g) Insert a page break after the first paragraph. (01 mark)
(h) Insert the image100.jpg on the first page. (03 marks)
(i) Apply a page boarder on the first page only. (01 mark)
(l) Insert your name as header and today’s date as the footer.
(02 marks)
(k) Set paper size to A5 for the whole document and print your work.
(02 marks)
1
2. As an ICT student, you are required to use a suitable publication
software and design a font cover page for the magazine called
Agriculture for Better as follows.
a) Use appropriate layout, paper balance, font variation and
relevant pictures. Save it as your name and personal number.
(10 marks)
b) Insert a clip to represent the writer at the bottom of the cover.
(02 marks)
c) Use your name as the author of the magazine. (01 mark)
d) Insert automatic current date to appear as the date of
publication. (02 marks)
e) Apply suitable background for the cover. (03 marks)
f) Insert your name and personal number as header. (01 mark)
g) Save and print your work. (01 mark)
2
3. A medical centre wishes to computerize all its patient’s records.
a) Create a database for the centre and save it as your name and
personal number. (01 mark)
b) In Design view, create a Table with the following properties
and save it as Patients Bio Table. (03 marks)
Field Name Properties
Patient’s Name Text (20)
Sex Text (1)
Residence Text (25)
Patient Code Text (04)
Date of Visit Date/Time(short Date)
Diagnosis Text(25)
c) Create a form for Patient Bio Table and enter the records
below, save it as Patient Bio Form (03 marks)
3
e) Populate the Patient Billing Table with the following data.
(03 marks)
4
4. As a peer educator, you have been told to prepare for a workshop
where you will address the youth about a topic “Adolescence”. A
folder called images has been provided to help you get all the related
pictures.
a) Prepare a presentation with six slides about adolescence as
follows.
i. Slide one: Introduction about the topic. (02 marks)
ii. Slide two: Characteristics of male adolescents. (02 marks)
iii. Slide three: Characteristics of female adolescents. (02 marks)
iv. Slide four: Effects of uncontrolled adolescence. (02 marks)
v. Slide five: Advice to adolescents. (02 marks)
vi. Slide six: Telephone contact is 256-56418545, website address
is www.youthclub.org and email is [email protected].
(01 mark)
b) Select any four pictures and insert them on appropriate slides.
(04 marks)
c) The presentation should run automatically without stopping.
(01 mark)
d) Insert your name and automatic date as footer. (02 marks)
e) Save your presentation as your name and personal number.
(01 mark)
f) Print all your slides on one page. (01 mark)
5
5. (a) Using an appropriate spreadsheet application, load the file Exam
results and save it as your name and personal number. (02 marks)
(b) Rotate the titles to an angle of 60 degrees. (02 marks)
(c) Copy the table to sheet 2 and rename the sheet modified.
(02 marks)
(d) Using appropriate functions compute;
i. Total marks obtained by each student to be placed in column P.
(03 marks)
ii. Average marks to one decimal place obtained in the compulsory
subjects (English, Mathematics, History, Biology and
Chemistry). Place the average marks in column Q. (03 marks)
iii. The number of students who sat for computer as one of their
option subjects. Place the result in cell C25. (02 marks)
iv. The highest score obtained in Chemistry. Place the result in cell
C26. (02 marks)
6
S850/2
Subsidiary ICT
PRACTICAL
Paper 2
Nov./Dec.2018
2 hours
INSTRUCTIONS TO CANDIDATES:
Each candidate is provided with support files in the folder UNEB Support
Files on the Computer Desktop. Use the support files where applicable to
supplement the questions.
Each candidate must produce a hard copy for each question answered to
accompany the Compact Disc (CD).
1
© 2018 Uganda National Examinations Board Turn Over
Answer any three questions in this paper
1. (a) Access the file IntrodWP.rtf and save it as your name and personal number.
(02 marks)
(b) Set the margins as; Top 1”, Bottom 1”, Left 1” and Right 1”. (02 marks)
(c) Format text to font size 12 and apply double line spacing. (02 marks)
(d) Apply a Drop cap on the first paragraph. (02 marks)
(e) (i) Make a bulleted list from the data in the second paragraph. (01 mark)
(ii) Split the list into two columns. (02 marks)
(f) Insert an appropriate heading for the text. (02 marks)
(g) Draw 4 point coloured line below the heading. (02 marks)
(h) Insert a watermark of your name. (02 marks)
(i) Insert a picture from the folder Images1 and send it behind. (02 marks)
(j) Save and print your work. (01 mark)
2
2. The following students sat for their term two examinations in Mathematics(mat),
Computer Studies (comp) and Commerce (com) and obtained the following marks:
(a) Enter the given data in a spreadsheet using appropriate column headings and
a table title. Save your work as your name and personal number. (06 marks)
(b) Use a formula in Column E to compute the average score for each student
and name it AVERAGE MARK. (02 marks)
(c) Sort the data in descending order based on column E. (01 mark)
(d) Incline the column headings to an angle of 450. (02 marks)
(e) (i) Create a column graph for the students’ marks in the three subjects.
Label your graph appropriately.
(ii) Move the graph to a new sheet and rename it as Students’ Marks.
(04 marks)
(f) Use an appropriate formula in column F to grade the students with the
criteria below:
EXCELLENT for all students with an average mark of 70 and above, PASS
for those with an average mark of 50 and above, but less than 70 and FAIL
for all students with an average mark below 50. (03 marks)
(g) Apply all borders on the data. (01 mark)
(h) Save and print all your work. (01 mark)
3
3. Use presentation software to design a five-slide presentation on Safe Water
Management.
(a) The slides should include:
(i) Slide I: Title and Introduction. (02 marks)
(ii) Slide II: Sources of water. (02 marks)
(iii) Slide III: Ways of making water safe for drinking. (02 marks)
(iv) Slide IV: Waterborne diseases. (02 marks)
(v) Slide V: Conclusion. (02 marks)
(b) Insert appropriate pictures from the folder Images2 on your slides. (03 marks)
(c) Set the date to update automatically. (01 mark)
(d) Set a transition loop of 10 seconds for all the slides. (02 marks)
(e) Insert your name and slide number as footer. (01 mark)
(f) Save your presentation as your name and personal number. (01 mark)
(g) Print your slides as handout on one page. (02 marks)
4
4. (a) Using any database management system software of your choice, create a
database to handle patient’s data. Save it as your name and personal number.
(01 mark)
(b) Open a file called Patients.xls. Copy that data and use it to create a database
table called OPD Table. (02 marks)
(c) Apply the most appropriate data types to the fields in OPD Table. (01 mark)
(d) Apply a primary key on an appropriate field. (01 mark)
(e) Use a Lookup wizard for the SEX field and fill in Male and Female. (02 marks)
(f) Sort the data in the table in descending order of AMOUNT PAID. (01 mark)
(g) Create a form called Patient’s Form containing all the fields in OPD Table.
(01 mark)
(h) On this form, create a new field NEW AMOUNT PAID if AMOUNT PAID is
increased by 10%. (02 marks)
(i) Create a query called Aged Patients showing patients born before 1990.
(02 marks)
(j) Create another query called Typhoid bush showing patients and come from
Bushenyi district. (02 marks)
(k) Create a report showing patients born before 1990. Call it Aged Report.
(02 marks)
(l) Insert a footer as your name and current date in the report. (02 marks)
(m) Print all your work. (01 mark)
5
5. Use Desktop publishing software to prepare a brochure for JK Computer Center
with the following details.
Company Name: JK Computer Center
Motto: Computer skills for better standards.
Location: Seventh Street, Jinja Road
Address: P.O Box 23, Kampala
Telephone Contact: 0773458098, 0712070797, 0707587473
E-mail Address: [email protected]
Website: http://www.jkcomputer
END
6
S850/3
Subsidiary ICT
PRACTICAL
Paper 3
Nov./Dec.2018
2 hours
INSTRUCTIONS TO CANDIDATES:
Each candidate is provided with support files in the folder UNEB Support
Files on the Computer Desktop. Use the support files where applicable to
supplement the questions.
Each candidate must produce a hard copy for each question answered to
accompany the Compact Disc (CD).
1. (a) Using a word processor application, load the file Mercedes.rtf. (01 mark)
(b) Save the file as your name and personal number. (01 mark)
(c) Cut the last sentence of the text and paste it as a centered heading.
(02 marks)
(d) Double underline the heading. (01 mark)
(e) Arrange your work in three columns except the heading. (03 marks)
(f) Insert at the beginning of the first column the image mercedes.jpg and
apply a tight text wrapping. (02 marks)
(g) Resize the picture to 1.12” height and 2.0” width. (02 marks)
(h) Apply double line space and a justify alignment to your work. (02 marks)
(i) Insert a suitable word of your choice as watermark. (02 marks)
(j) Apply a 6pt page border of any colour around your work. (01 mark)
(k) Insert your name, personal number and an automatic date as footer.
(01 mark)
(l) Save and print your work. (01 mark)
1
2. (a) Using spreadsheet software, open the file overtime.xls and save it as your
name and personal number. (02 marks)
(b) Format the DATE column to display date in this format 31-feb-2015.
(01 mark)
(c) (i) Insert in cell E2 the column name REGULAR WAGE.
(ii) Compute in E2 the wages earned for regular hours at a rate of
Sh.3100 per hour. (02 marks)
(d) (i) Insert in cell F2 the column name OVERTIME WAGE.
(ii) Compute in column F the wages earned for overtime hours at a rate of
Sh.3300 per hour. (02 marks)
(e) Compute in the G the total wage earned by the labourers.
Name the column GROSS. (02 marks)
(f) In column H, compute the income tax that is 17% of gross.
Name the column TAX. (02 marks)
(g) Compute the net pay of each labourer. (02 marks)
(h) Revise the title to include the computed information. (01 mark)
(i) Use a column chart to illustrate each labourer’s regular and overtime wage
(04 marks)
(j) Apply all borders to your data. (01 mark)
(k) Save and print your work. (01 mark)
Turn Over
3. The table below gives information about some students in XY Secondary
School.
3
4. (a) Prepare a four-slide presentation about a hotel business as follows
(i) Slide One: Hotel name in Word Art format, the hotel address and
an image. (04 marks)
(ii) Slide Two: Use bullets to outline the services offered. (02 marks)
(iii) Slide Three: Use a table to show the hotel menu for breakfast and
Lunch. (05 marks)
(iv) Slide Four: Use images or text to represent various prices of the
drinks. (04 marks)
(b) Add your name and personal number as header to all slides. (02 marks)
(c) Save your work as your name and personal number. (01 mark)
4
5. (a) Using a publishing software, design a certificate of merit to be awarded to
participants in a debating competition. The motion of the debate is The
Teaching of ICT has brought more positive effects that negative effects.
Save your work as your name and personal number. (02 marks)
(b) Set the dimensions of the certificate to width 11 inches and height 8.5
inches. (02 marks)
(c) Provide an appropriate title and apply Word Art in the title. (03 marks)
(d) (i) Use relevant content of a certificate and also include the motion of the
debate. (05 marks)
(ii) Include your name and the recipient of the certificate. (01 mark)
(e) Insert any logo from the folder Images. (02 marks)
(f) Use a suitable background for your certificate. (02 marks)
(g) Apply a border to enclose your certificate. (02 marks)
(h) Save and print your certificate as your name. (01 mark)
END
5
S850/2
Subsidiary ICT
PRACTICAL
Paper 2
Nov./Dec.2019
2 hours
INSTRUCTIONS TO CANDIDATES:
Each candidate is provided with support files in the folder UNEB Support
Files on the Computer Desktop. Use the support files where applicable to
supplement the questions.
Each candidate is provided with a new blank Compact Disc (CD).
Each candidate must produce a hard copy for each question answered to
accompany the Compact Disc (CD).
1. (a) The table below shows part of a timetable for World of Wonders
Secondary School.
BREAK
(a) Use a word processor to produce the table above. Save it as timetable.
(09 marks)
(b) Add an appropriate heading to the table and centre it. (02 marks)
(c) Highlight the days with a light colour. (02 marks)
(d) For the text “ENJOY YOUR CAREER”, use Algerian font face and size
12.5. (02 marks)
(e) Copy and paste the table to another page. (01 mark)
(f) Add centre-aligned page numbers in the bottom margin. (02 marks)
(g) Insert a footer of your name and personal number. (01 mark)
(h) Save and print all your work. (01 mark)
Turn Over
3
3. (a) Using a spreadsheet software, open then file my retail shop and save it as
your name and personal number. (02 marks)
(b) Format the currency values to Ugandan Shillings, using the symbol UgX.
(02 marks)
(c) Type the following labels in the cells: (02 marks)
A15 Total sales
A16 Highest sales
A17 Lowest sales
A18 Average sales
(d) Type the column titles SALES in cell D1 and COMMISSION in the cell
E1. (01 mark)
(e) Use appropriate formula to calculate
(i) The SALES for each item. (02 marks)
(ii) Total sales for all items. (02 marks)
(iii) The Highest sales, Lowest sales and Average sales. (03 marks)
(iv) The COMMISSION at 5% of the sales, given to the sales person.
(02 marks)
(f) Insert a row at the top of the worksheet and enter a suitable heading for
the data. (02 marks)
(g) Insert a current date and time in the footer. (01 mark)
(h) Save and print your work. (01 mark)
4. (a) Using any publication software, create a blank page as shown below.
Save it as your name and personal number. (04 marks)
5
4
4
(b) Link text boxes 2 and 6 such that information in text box 2 flows to text
box 6. (02 marks)
(c) Open the files Newsletter. (01 mark)
(d) Copy all the text in the first and second paragraphs from the file
Newsletter and paste it in textbox 2. (01 mark)
(e) Drop cap on the first paragraph in text box 2. (01 mark)
(f) Copy the last paragraph from Newsletter and paste it in textbox 5.
(01 mark)
(g) In text box, type a suitable heading for the Newsletter article. (01 mark)
(h) Using Word Art, type the word Daily Brain on top of text box 1 as the
name of the Newsletter. (02 marks)
(i) Load an image Birds and fit from the folder Images. (03 marks)
i. Fit it in the textbox 4.
ii. Flit the picture horizontally.
(j) Load another image Lands.JPG from the folder Images and fit in
textbox 3. (02 marks)
(k) Insert a footer of your name and personal number. (01 mark)
(l) Save and print your work. (01 mark)
5 END
S850/2
Subsidiary ICT
PRACTICAL
Paper 3
Nov./Dec.2019
2 hours
INSTRUCTIONS TO CANDIDATES:
Each candidate is provided with support files in the folder UNEB Support
Files on the Computer Desktop. Use the support files where applicable to
supplement the questions.
Each candidate is provided with a new blank Compact Disc (CD)..
Each candidate must produce a hard copy for each question answered to
1. (a) Using a word processor, load the file education and save it as your name
and personal number. (02 marks)
(b) Insert a picture pup.jpg as a water mark. (02 marks)
(c) Change font size of the whole text to 13. (01 mark)
(d) Add a suitable heading for the text and format it with the Title style.
(03 marks)
(e) Justify the whole text. (02 marks)
(f) Insert borders on the last paragraph. (02 marks)
(g) Add a footnote on the word education (which is bold) with a statement
defining education. (03 marks)
(h) Copy all the content of the document to another page. (01 mark)
(i) Insert any page number apart from the Arabic numerals (1,2,3...) on top
of the pages. (02 marks)
(j) Insert a footer of your name and personal number. (01 mark)
(k) Save and print your work. (01 mark)
2
3. The table below shows part of the database of employees of Bright Bottling
Company in Uganda
(a) Use a suitable database software, create a database and save it as your
name & personal number. (01 mark)
(b) Design a table named Employee table with appropriate data types in
design view, using the given information. (04 marks)
(c) Enter the data give in the table. (03 marks)
(d) Create a query with all fields to filter female employees in the computer
department and save it as computer dep. (02 marks)
(e) Create another query to calculate the ACTUAL SALARY if all
employees are registered with NSSF and 15% is deducted. Save it as
Actual Salary. (03 marks)
(f) Create a report from the Actual Salary query with all fields and save it as
Query Report.
(g) Create a form with a light background colour to show the fields EMPNO,
NAME, DEPARTMET AND SALARY. Save it as Salary Form.
(03 marks)
(h) Insert your name and personal number as the footer in the salary form.
(01 mark)
(i) Save and print all your work. (01 mark)
3 Turn Over
4. (a) Load the file Reduto using a presentation software and save it as your
name and personal number. (02 marks)
(b) Using a master slide to make all the following settings: (04 marks)
i. All titles in the presentation should be in one colour apart from
black.
ii. Insert the picture vent.JPG from the folder Images.
iii. Insert a thick line.
iv. Type your name in the footer with font size 26.
(c) Pick three picture from the folder Images and place each image on an
appropriate slide. (03 marks)
(d) i Insert a new slide with a blank layout between the title slide and
slide two. (01 mark)
ii. On the new slide, type the words WELCOME TO THE SHOW
using Word Art feature. (01 mark)
iii. Insert a picture on the slide to appear behind the words. (01 mark)
(e) i Type the benefits of Agriculture on the blank slide. (01 mark)
ii. Move the slide containing the benefits to the end of the
presentation. (01 mark)
(f) Delete the slide with the title Problems in Agriculture. (01 mark)
(g) Using the word “animals” on slide 3, link slide 3 to slide 5. (02 marks)
(h) Insert an updating data on all the slides. (01 mark)
(i) Save and print all the slides on one sheet. (02 marks)
5. (a) Using a spreadsheet application, open the file Analysis and save it as
your name and personal number. (02 marks)
(b) Enter the column titles: TOTAL, AVERAGE, POSTION and
COMMENT in the cells O2, P2, Q2, and R2 respectively. (02 marks)
(c) Use appropriate formulas to determine for each student the:
i. TOTAL mark. (02 marks)
ii. AVERAGE mark. (02 marks)
iii. POSITION. (03 marks)
iv. COMMENT. Promoted for the position 4 or below and Repeat
otherwise. (03 marks)
(d) Insert a column chart showing students total marks, include chart and
axes titles. (04 marks)
(e) Insert a header of your name and personal number. (01 mark)
(f) Save and print your work. (01 mark)
4 END
S850/2
Subsidiary ICT
PRACTICAL
Paper 2
Nov./Dec.2020
2 hours
INSTRUCTIONS TO CANDIDATES:
Each candidate is provided with support files in the folder UNEB Support
Files on the Computer Desktop. Use the support files where applicable to
supplement the questions.
Each candidate is provided with a new blank Compact Disc (CD).
Use a permanent marker to write your name. random and personal numbers
on our CD.
Each candidate must produce a hard copy for each question answered to
accompany the Compact Disc (CD).
1. (a) Using a word processing application, open the file PRODUCTION and
save it as your name and personal number. (02 marks)
(b) Copy the text and paste it to the next page. (01 mark)
(c) And a suitable title for the text and set it: (04 marks)
(i) To Times New Roman, size 26.
(ii) in Bold.
(d) Format the text in two columns. (02 marks)
(e) Insect in the document any two pictures from the Image folder.
(02 marks)
(f) Add a Drop Cap in the appropriate paragraph. (02 marks)
(g) Set the phrase “food people demand” in the first paragraph on the first
page, to link to the title on the second page. (02 marks)
(h) Insert a suitable Watermark of your choice in the document. (02 marks)
(i) Insert current date and time as the header. (02 marks)
(j) Save and print your work. (01 mark)
(a) Create a layout for the Certificate and save it as your name and personal
number. (03 marks)
(b) Open the file Document and insert the text appropriately in your layout.
(06 marks)
(c) Insert appropriately any picture as a logo from the Image. (03 marks)
(d) Use relevant signatories for your certificate, period of the workshop and
venue. Place them in appropriate locations. (03 marks)
(e) Create three page border lines of 12 points each, with three different
colors. (02 marks)
(f) Insert your name and personal number in the page footer. (02 marks)
(g) Save and print your publication. (01 mark)
2
3. (a) Using a database software, load the file Test and save it as your name
and personal number. (02 marks)
(b) Change the data type of TEST ONE/30 and TEST TWO/70 to Number.
(02 marks)
(c) Modify the fields TEST ONE/30 and TEST TWO/70 as follows;
(i) Add a validation rule to limit the user from entering marks beyond
30 and 70 respectively. (02 marks)
(ii) Enter the validation text for both fields as “Beyond Maximum”.
(
(02marks)
(iii) Add appropriate description for the two fields: (02 marks)
(ii) Total marks for each students. Save it as TOTAL. (02 marks)
3
Turn Over
(e) Apply a two-color background to all the slides. (01 mark)
(f) Set the slides to run automatically every 5 seconds. (01 mark)
(g) Insert automatic date and time on all the slides. (01 mark)
(h) Save the presentation as your name and personal number. (01 mark)
(i) Print your slides as a handout. (01 mark)
5. The worksheet below shows a payroll of M & C Enterprises for the month of
January, 2016.
(a) Using an appropriate spreadsheet application, enter the given data and
save it as your name and personal number. (06 marks)
END
4
S850/2
Subsidiary ICT
PRACTICAL
Paper 3
Nov./Dec.2020
2 hours
INSTRUCTIONS TO CANDIDATES:
Each candidate is provided with support files in the folder UNEB Support
Files on the Computer Desktop. Use the support files where applicable to
supplement the questions.
Each candidate is provided with a new blank Compact Disc (CD).
Use a permanent marker to write your name. random and personal numbers
on our CD.
Each candidate must produce a hard copy for each question answered to
accompany the Compact Disc (CD).
1. (a) Using a word processing application, open the file Diet and save is
your name and personal number. (02 marks)
(b) Copy the document to page two. (01mark)
(c) Add a suitable heading for the document. Double underlined it and format
it to font size 17.5. (03 marks)
(d) Insert a two-line Drop Cap on the first paragraph. (02 marks)
(e) Convert paragraph two to two columns with a line separator. (02 marks)
(f) Use a bulleted list for the major causes of overweight in paragraph three.
(02 marks)
(g) Insert page number in any format other than `1,2,3….` (02 marks)
(h) Add an appropriate image as a Watermark. (02 marks)
(i) Set all page margins to 1.4 inches. (01 mark)
(j) Add a header as the current date and time. (02 marks)
(k) Save and print your work. (01 mark)
2. (a) Using a spreadsheet application, open the file Day book and save it as
your name and personal number. (02 marks)
(b) Add the column headings: Gross Pay, Revenue Tax, Net pay and
Employee Rank. (01 mark)
(c) Gross Pay which is the summation of basic pay and allowances.
(02 marks)
(d) Revenue Tax (Revenue tax is 10% of basic pay). (02 marks)
(e) Net Pay which is gross pay minus revenue tax. (02 marks)
(f) Employee Rank based on the Basic Pay. (03 marks)
(g) Insert a suitable title for the data centered across the table. (02 marks)
(h) Add All Borders to the cells containing the table. (01 mark)
(i) Draw a pie-chart showing Revenue Tax for the employees. Add a
suitable heading for the chart. (03 marks)
(j) Insert your name and personal number as a footer. (01 mark)
(k) Save and print your work. (01 mark)
2
3. Using a presentation software, create a four-slide presentation as follows:
(a) On the title slide:
(i) Give title as Computer System. (01 mark)
(ii) Type your name as the presenter. (01 mark)
(iii) Put animation as the title. (01 mark)
(iv) Insert an appropriate Clip Art of your choice. (01 mark)
4. The tables below shows bio-data of couples who are planning to wed at a
church in Uganda
HUSBANDS TABLE
HUSID HUS NAME DATE OF HUS DISTRICT AMOUNT
BIRTH
HUS001 KIGUNDU FRANK 02/7/1974 ENTEBBE 50000
HUS002 OMUUT EMMANUEL 18/7/1980 PALLISA 70000
HUS003 KIRYA MARTIN 19/19/1949 BUDAKA 90000
HUS004 ODONG ROBERT 5/8/1960 PALLISA 60000
HUS005 ISABIRYE ENOCK 11/3/1956 JINJA 40000
3 Turn Over
WIVES TABLE
WIVID HUSID WI NAME DATE OF BIRTH WI DISTRICT CONTRIBUTION
W001 HUS005 NABWIRE ROSE 19/5/1956 BUSIA
W002 HUS003 ARACH HILDA 14/2/1979 GULU
W003 HUS004 ACEN CHRISTINE 24/11/1988 OYAM
W004 HUS002 KATAIKE ALICE 26/1/1955 JINJA
W005 HUS001 NAMULI SARAH 5/4/1986 MASAKA
(a) Using appropriate software, create a database and save it as your name
and personal number. (01 mark)
(b) Design two table tables, HUSBANDS TABLE and WIVES TABLE for
the given data. Use appropriate data types. (06 marks)
(c) Populate the two tables with the data given. (04 marks)
(d) Create a one-to-one relationship between the two tables. (02 marks)
(e) Create a query displaying the following fields: HUSID , HUS NAME,
AMOUNT, WIVID and CONTRIBUTION. Compute CONTRIBUTION
which is 10% of the AMOUNT. Save the query as Contribute.
(04 marks)
(f) Create a report for the Contribute query and save it as Contribute
Report. (02 marks)
(g) Print all your work. (01 mark)
5. (a) Using a publication software, design a card of appreciation to an
employee for special services rendered to an institution as follows:
(04 marks)
(i) Create a blank page.
(ii) Change the page to landscape orientation.
(iii) Set the dimension to 8”by 8”
(iv) Set all margins to 1.1”.
(b) Insert the relevant text in the card. (04 marks)
(c) Apply Boarder Art of your choice around the card. (02 marks)
(d) Enhance your card with appropriate background, colour and text fonts
(03 marks)
(e) Insert on the card a logo of your choice. (03 marks)
(f) Type your name in a coloured font as the person to be appreciated.
(02 marks)
(g) Save your card as your name and personal number. (01 mark)
(h) Print your card. (01 mark)
4 END
S850/2
Subsidiary ICT
PRACTICAL
Paper 2
Nov./Dec.2022
2 hours
INSTRUCTIONS TO CANDIDATES:
Each candidate is provided with support files in the folder UNEB Support
Files on the Computer Desktop. Use the support files where applicable to
supplement the questions.
Each candidate is provided with a new blank Compact Disc (CD).
Use a permanent marker to write your name. random and personal numbers
on our CD.
Each candidate must produce a hard copy for each question answered to
accompany the Compact Disc (CD).
1. (a) Use a word processor of your choice to produce the following document.
Save it as your name and personal number. (05 marks)
The Media Association
P.O. Box 001, Baden
[email protected]
18/05/2022
Dear Sir/Madam.
INNOVATION EXHIBITION
The importance of innovation management is growing both in practice
and in academia. This exhibition will present, for the first time a coherent
analysis of the development of innovation and entrepreneurship.
The initiative is aimed at promoting science and technology through
project based learning in secondary schools, in an effort to illicit interest
in science and technology.
Schools will present projects depicting application of robotics in line with
theme. A school which will emerge best, is one which will have the best
presentation.
Give entrepreneurship a chance to maximize social impact.
(g) Print only the letters to Mr. Okoth Francis and Imam Ali Laden.
(02 marks)
2
2. (a) Using a spreadsheet software, load the file Produce. Save it as your
name and personal number. (02 marks)
(b) Insert a suitable heading for the data. (02 marks)
(c) Using appropriate formulas, computer per item the:
(i) TOTAL COST. (02 marks)
(ii) TOTAL SALES. (02 marks)
(iii) PROFIT. (02 marks)
(d) Add a column called %profit and compute the percentage profit without
decimal places. (03 marks)
(e) Apply thousands separator to all numeric data. (01 mark)
(f) (i) Create a Pie-Chart of ITEM and TOTAL COST. (02 marks)
(ii) Save the Pie-Chart on another sheet. (01 mark)
(iv) Include data labels in percentage on your Pie-Chart. (01 mark)
(g) Apply all border to the whole document. (01 mark)
(h) Print all your work. (01 mark)
3
3. You are required to prepare a five-slide presentation on Green Computing.
Open the file Green Computing and use the information in your slides as
follows:
(a) Slide One
(i) Include a title and the presenter’s name on the slide. (02 marks)
(ii) Format the title using Word Art. (02 marks)
(b) Slide Two
Include a bulleted list showing the goals of Green Computing.(03 marks)
(c) Slide Three
Insert the table on Power Consumption Statistics of a Laptop onto the
slide. (02 marks)
(d) Slide four
(i) Use the data in the table to generate a Chart. (02 marks)
(ii) Insert a hyperlink on Slide two , linking to Slide four. (02 marks)
(e) Slide Five
Add a conclusion to the presentation. (02 marks)
(f) Insert on any two slides, appropriate clips from the IMAGE folder.
(02 marks)
(g) Insert on each slide a Header of your name and personal number.
(01 mark)
(h) Print the slides as a handout. (02 marks)
4
4. The table below shows some members of an Inter-Religious group and their
contributions towards Soul Enrichment:
RELIG. FIRST DATE OF SEX RELIGION CONTRIBUTION
No NAME BIRTH
R002 Anne 01/02/1990 F Catholic 10000
R003 Georgina 02/23/1988 F Anglican 19000
R004 Dorcas 04/14/1987 F Adventist 300000
R005 Jane 05/11/1990 F Catholic 350000
R006 Chris 08/12/1988 M Orthodox 200000
R007 Joel 03/22/1995 M Anglican 250000
R008 Abdala 08/30/1999 M Moslem 400000
5
5. Using any Desktop Publisher. Design a Restaurant menu as follows:
(a) Open a blank A4 Landscape publication and save it as your name-
Personal number. (02 marks)
(b) Divide the page into equal portions as illustrated below. (02 marks)
FACE 1 FACE 2
(c) Add a banner at the top of FACE 1 where you will place the Restaurant
Name. (02 marks)
(d) Use word Art to add the Restaurant Name in the banner. (02 marks)
Open the file Restaurant and use the text to answer part (e).
(e) Place items for categories (i) and (ii) on FACE 1 and those for categories
(iii) and (iv) on FACE 2. (04 marks)
(f) Place on each category an appropriate picture from the IMAGE folder.
(04 marks)
(g) At the bottom of FACE 2, insert: (03 marks)
(i) The contact information of the restaurant (Two mobile phone
contacts and e-mail.)
(ii) Your name and personal number.
6
S850/2
Subsidiary ICT
PRACTICAL
Paper 3
Nov./Dec.2022
2 hours
INSTRUCTIONS TO CANDIDATES:
Each candidate is provided with support files in the folder UNEB Support
Files on the Computer Desktop. Use the support files where applicable to
supplement the questions.
Each candidate is provided with a new blank Compact Disc (CD).
Use a permanent marker to write your name. random and personal numbers
on our CD.
Each candidate must produce a hard copy for each question answered to
accompany the Compact Disc (CD).
1. (a) Using a word processing software of your choice, open the file Speech
and save it as your name and personal number. (02 marks)
2. (a) Using any database software, create a database and save it as your name
and personal number. (02 marks)
(b) Use the data in the file Library.xls create a table with appropriate data
types. Name the table Student Borrowing. (06 marks)
(c) Create a form that will be used to enter more records to the table Student
Borrowing. Name the form Data Entry Form. (03 marks)
(d) Design a query that will display details of students in S.3 who have
borrowed books. Name it S3 borrowers Query. (04 marks)
(e) (i) Create a report for students of S.3 who have borrowed books.
Name it S.3 borrowers Report. (03 marks)
(ii) Insert in the report a suitable picture from the IMAGE folder to
represent a logo for the school library. (01 mark)
(f) Print all your work. (01 mark)
2
3. Using any publishing software, design a certificate for a student who completed
an ICT course from a training institutions.
(a) Use a blank publication of A4 portrait to design the certificate of
completion and save it as your name and personal number. (02 marks)
(b) Adjust the paper size using the following dimensions: width 8.4 inches
and height 11.8 inches. (02 marks)
(c) Adjust the top and bottom margins to 0.3 inches. (01 mark)
(d) Adjust the left and right margins to 0.3 inches. (01 mark)
(e) Insert an appropriate logo provided in the IMAGE folder. (02 marks)
(f) Include a suitable name for the training institution. Use a font type of and
size of your choice. (02 marks)
(g) Add an appropriate title on the certificate. Format it using a Word Art.
(02 marks)
(h) Copy the text from ICT CERT and paste it on the certificate. (02 marks)
(i) Insert an appropriate picture from the IMAGE folder and order it behind
text. (02 marks)
(j) Insert an attractive border to your certificate. (01 mark)
(k) Include a background colour of your choice. (01 mark)
(l) Type your name and personal number in the footer. (01 mark)
(m) Save and print the certificate. (01 mark)
3
4. (a) Using spreadsheet software, enter the given data in a worksheet. Save it
as your name and personal number. (05 marks)
4
5. You have been selected to address the youth on the topic Responsible Living.
(a) Using a suitable presentation software, prepare a five-slide presentation
with the following given in parts (i) to (v).
(i) Slide one: Title and the presenters’ name. (02 marks)
(ii) Slide two: The meaning of Responsible Living. (02 marks)
(iii) Slide three: A two column slide showing the dangers of reckless
living. (03 marks)
(iv) Slide four: Benefits of responsible living including speaker
notes. (03 marks)
(v) Slide five: Conclusion. (02 marks)
(b) Add relevant pictures from the IMAGE folder to your slides. (02 marks)
(c) Apply the transition effects to the presentation. (01 mark)
(d) Insert a blank slide between the first and the second slides and hide the
slide not to display while presenting. (02 marks)
(e) Insert slide numbers on each slide. (01 mark)
(f) Save your work as your name and personal number. (01 mark)
(g) Print your presentation. (01 mark)
5
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
CamScanner
s8s0/3
SUBSTDIARY ICT
Paper 3
(Practical)
Nov./Dec.2024
2 hours
Paper 3
(Practical)
D 2 hours
INSTRUCTIONS TO CANDIDATES:
-
This paper consists of five questions.
You are provided with support files in the folder UNEB Support Files on the
Compnter Desktop. Use the Support files where applicable to supplement the
questions.
(Jse a permanent marker to write your nome, random and personal numbers on
your CD.
You should continually save your work.
You must produce a hard copy for each of your work to accompany a soft copy on
the Compact Disc (CD).
The banking sector has embraced the use of technology to serve its
clients faster and also to do more with less. Emerging technologies have
changed the banking industry from paper and branch-based banks to
drgrttzed and nefworked banking services. Unlike before, broadband
internet is cheap and it makes the transfer of data easy and fast.
Technology has changed the accounting and management system of all
banks. And it is now changing the way banks are dilivering services to
their customers. However, this technology comes at a cost,
implementlng all this technology has been expensive but the rewards
are limitless.
2
2. (a) Use a spreadsheet software to open the file Accounts Ofc-Staff and
save it as your name and personal number. (02 marks)
(b) Add the following new column headings to the Staff Payroll table.
02 u*b)
0vertime Years in Development Gross Pay Net Pay
Allowance Service Allowance (Shs) (Shs)
(Shs) (Shs)
(e) Development Allowance for employees who have worked for more
than five years which is Excess Years x 35,000. (03 marlcs)
(e) Net Pay for each employee which is Gross Pay-NSSF Contribution.
(NSSF Contribution is 5% of Gross Pay). (03 marl<s)
(i) Incl,ude a footer of your name and personal number. (01 mark)
3 Turn Over
(b) Insert two suitable images from the IMAGE folder, on any two slides.
(02 marks)
(c) Apply slide transitions and animations to your presentati on.(02 marks)
(b) Design a table with appropriate data types using the students' bio-data
provided below. Save it as STD biodata.
{04 marks)
(c) Add a caption on the PHONE field. Name it Contact. (02 marks)
(d) (i) Design a form for the table and add an appropriate title. Save it
as STD Form. ( 02 marks)
(e) create a query that displays the students' age and all the other fields
for the students who were born after the year lggg. Save the query as
STD Age ( O+ ,i*t 11
(0 Generate a report for the STD Age query and save it as STD Age
Report. eimctrks)
(e) Print all your work. (01 mark)
4
s. (a) using a desktop publishing software, open a blank page in landscape
orientation. Save it as your name and personal number. (02 martcs)
5 EI\D