0% found this document useful (0 votes)
6 views23 pages

COMPUTER

The document provides detailed answers to various questions related to computer devices, software, operating systems, and internet connections. It covers topics such as the functions of different computer components, types of software, data communication, and computer security. Additionally, it discusses the implications of using computers in society and the economy, as well as technical aspects of computer operations.

Uploaded by

shankalahazahala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views23 pages

COMPUTER

The document provides detailed answers to various questions related to computer devices, software, operating systems, and internet connections. It covers topics such as the functions of different computer components, types of software, data communication, and computer security. Additionally, it discusses the implications of using computers in society and the economy, as well as technical aspects of computer operations.

Uploaded by

shankalahazahala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 23

Here are concise answers to the questions in the image:

Question 1

a) Briefly describe the use of each of the following computer devices.

 Disk drive: A device used to read from or write data to a disk, such as
a hard disk, floppy disk, or optical disk (CD/DVD).
 UPS (Uninterruptible Power Supply): Provides backup power during
electricity outages, ensuring the computer runs smoothly without
sudden shutdowns.

b)

 i) What is a mouse?
A mouse is an input device that allows users to interact with a computer
by controlling a pointer on the screen.
 ii) Two types of mice:

1. Optical mouse (uses light to detect movement).


2. Mechanical mouse (uses a ball to detect movement).

c) What is the importance of a UPS?

1. Prevents data loss by providing backup power.


2. Protects devices from power surges or fluctuations.
3. Ensures smooth shutdown during prolonged outages.

d) Qualities of good information:

1. Accuracy: Free from errors.


2. Timeliness: Delivered when needed.
3. Relevance: Meets the needs of the user.
4. Completeness: Provides all necessary details.
5. Clarity: Easy to understand.

Question 2

a) With a labeled diagram, show with arrows how the computer is related to both input
and output devices.

 Input devices (e.g., keyboard, mouse) send data to the CPU.


 The CPU processes the data and sends output to output devices (e.g.,
monitor, printer).
(Draw a basic diagram showing arrows from input devices to CPU, and
CPU to output devices.)

b)

i) What is memory, and name two basic types?


Memory is the storage system in a computer for saving and retrieving data.
Types:

Primary Memory (e.g., RAM, ROM).

Secondary Memory (e.g., HDD, SSD).

ii) Difference between primary and secondary memory:

Primary Memory: Fast, temporary, and directly accessible by the


CPU (e.g., RAM).

Secondary Memory: Slower, permanent, and used for long-term


storage (e.g., hard drives).

c) Use a labeled diagram to show the relationship between the computer and input/output
devices.
(Refer to answer in 2a for a similar diagram.)

d)

i) Three sections embedded in the CPU:

Control Unit (CU): Directs operations within the computer.


Arithmetic Logic Unit (ALU): Performs calculations and logical
operations.

Registers: Temporary storage for quick data access.

ii) Difference between a CD and a DVD:

Storage capacity: A DVD holds more data (4.7–17 GB) than a CD


(up to 700 MB).

Usage: CDs are mainly used for audio, while DVDs are used for video
and large files.

Answers to the Questions

a) In an institution like Kyambogo University using the eKampus system, which type of
computer would you recommend and why?

 Recommendation: Mainframe computer.


 Why: Mainframes are designed for simultaneous data processing by
multiple users, making them ideal for handling large-scale applications
like university management systems.

b) List any three components of a micro-computer.

1. Central Processing Unit (CPU): Processes instructions and data.


2. Memory (RAM/ROM): Temporarily stores data for processing.
3. Input/Output Devices: Used to interact with the computer (e.g.,
keyboard, monitor).
c) Explain any four classifications of computers with examples.

1. Supercomputers: Extremely powerful for complex calculations (e.g.,


weather forecasting).
2. Mainframe Computers: Large systems for bulk data processing (e.g.,
banking systems).
3. Minicomputers: Mid-sized computers for small organizations (e.g.,
laboratory systems).
4. Microcomputers: Personal computers for individual use (e.g., laptops,
desktops).

d) Give any social and economic implications of using computers.

 Social Implications:

1. Increased connectivity and communication.


2. Dependency on technology leading to potential digital divide.

 Economic Implications:

1. Job creation in IT industries.


2. Automation reducing manual jobs.

e) Define an operating system, pointing out two ways it can be structured.

 Definition: An operating system (OS) is software that manages


hardware and software resources, providing services for applications
and users.
 Two ways it can be structured:

3. Monolithic: All OS components operate in a single layer (e.g.,


Linux).
4. Modular: Components are separated for flexibility (e.g.,
Windows).

f) What do you understand by kernel mode and user mode in an operating system?

 Kernel Mode: The OS operates with full access to hardware and


system resources. It performs critical tasks like memory management.
 User Mode: Applications run with limited access to system resources,
ensuring system stability and security.
g) Give any two basic functions of an operating system.

1. Resource Management: Allocates and manages CPU, memory, and


I/O devices.
2. File Management: Creates, organizes, and controls access to files on
storage devices.

A
nswers to the Questions

a) Explain any 3 types of system software.

1. Operating System (OS): Manages hardware and software resources


(e.g., Windows, Linux).
2. Device Drivers: Enable communication between the OS and hardware
devices (e.g., printer drivers).
3. Utility Programs: Perform maintenance tasks (e.g., antivirus software,
disk cleanup tools).

b) Give any 2 features of application software and system software.

 Application Software:

1. Designed for specific tasks (e.g., word processing, spreadsheets).


2. User-focused and interacts directly with users.

 System Software:

1. Supports the operation of hardware and application software.


2. Operates in the background without user intervention.

c) Describe any 3 types of software installation.

1. Attended Installation: Requires user input during the installation


process (e.g., selecting options or accepting agreements).
2. Unattended Installation: Runs automatically without user input,
typically using predefined settings.
3. Silent Installation: Installs without displaying prompts or messages to
the user, often used in enterprise environments.

d) Differentiate between hardware internal and external installation.

 Internal Installation: Involves installing hardware components inside


the computer (e.g., RAM, hard drives).
 External Installation: Involves connecting external devices to the
computer (e.g., USB drives, external monitors).

e) Differentiate between perfective and adaptive software maintenance.

 Perfective Maintenance: Improves software performance or adds


new features without fixing defects.
 Adaptive Maintenance: Modifies software to work in a new or
changing environment (e.g., after OS upgrades).

f) Describe the various input devices that can be used to input the following types of data:

1. Text: Keyboard.
2. Audio: Microphone.
3. Images: Scanner or camera.
4. Barcodes: Barcode scanner.
Answers to the Questions

g) Write the following in full:

1. BIOS: Basic Input/Output System.


2. HTTPS: HyperText Transfer Protocol Secure.
3. FAT: File Allocation Table.
4. NTFS: New Technology File System.

Question Three

a) Briefly describe the steps to insert an automatic table of contents in Word:

1. Format the headings in your document using "Heading Styles" (e.g.,


Heading 1, Heading 2).
2. Place the cursor where you want the table of contents to appear.
3. Go to the References tab in the ribbon.
4. Click on Table of Contents and choose an automatic style.

b) To avoid unauthorized access to your document, describe how to add a password in


Word:

1. Click on File in the top-left corner.


2. Select Info and then Protect Document.
3. Choose Encrypt with Password.
4. Enter a password and confirm it.
5. Save the document to ensure the password is applied.

c) Explain the process of inserting page numbers in Word:

1. Click on the Insert tab in the ribbon.


2. Select Page Number from the Header & Footer section.
3. Choose the desired position for the page numbers (e.g., top of the page,
bottom of the page).
4. Customize the format if needed and click OK.

d) Differentiate the following as used in Word:

Copy and Cut:

1. Copy duplicates selected text or objects without removing them


from the original location.
2. Cut removes the selected text or objects from the original location
for pasting elsewhere.

Save and Save As:

1. Save updates changes to the existing file.


2. Save As creates a new file or saves the current file in a different
location, format, or name.

Superscript and Subscript:

1. Superscript positions text slightly above the normal line (e.g., x²).
2. Subscript positions text slightly below the normal line (e.g., H₂O).

e) Use of the following in a Word document:

1. Themes: Predefined sets of colors, fonts, and formatting options to


maintain a consistent look.
2. Breaks: Used to divide a document into sections or pages for
formatting purposes (e.g., page break, section break).
3. Header and Footer: Areas at the top and bottom of the page where
repetitive information (e.g., page numbers, document title) is displayed.
Answers to Question Four

a) Define the term process:


A process is a program in execution, which includes the program code, its current activity (such
as instruction execution), and its associated resources (e.g., CPU time, memory, files).

b) Given the process states below, describe transition 1, 2, 3, and 4:

Transition 1 (Ready → Running):


The process is selected by the scheduler and starts executing on the CPU.

Transition 2 (Running → Blocked):


The process is waiting for an event (e.g., I/O operation completion) and cannot continue
until the event occurs.

Transition 3 (Blocked → Ready):


The process has finished waiting (e.g., the I/O operation is complete) and is now ready to
be scheduled again for execution.

Transition 4 (Running → Ready):


The process is interrupted (e.g., due to time slice expiration in preemptive scheduling) and
placed back in the ready queue.

c) Describe any 2 ways a process can be created and 2 ways a process can be terminated:

Ways a process can be created:


1. System Initialization: Processes are created when the operating
system starts (e.g., background processes like services and daemons).
2. User Request: A process is created when a user starts a program
(e.g., opening a browser or running a command).

Ways a process can be terminated:

1. Normal Exit: The process completes its execution successfully and


exits.
2. Error Exit: The process terminates due to an error (e.g., invalid input,
resource unavailability).

d) Differentiate between preemptive and non-preemptive scheduling:

Preemptive Scheduling:

 The CPU can be taken away from a process, even if it is not finished (e.g., due to
higher-priority processes).

 Example: Round Robin, Priority Scheduling.

Non-Preemptive Scheduling:

 A process retains the CPU until it voluntarily releases it (e.g., by


completing or waiting for an I/O operation).
 Example: First-Come-First-Serve (FCFS), Shortest Job Next (SJN).

Answers to Question Five

a) What is the role of the following in an internet connection?

FTP (File Transfer Protocol):


FTP is used to transfer files between computers over the internet. It allows users to upload,
download, and manage files on remote servers.
TCP (Transmission Control Protocol):
TCP ensures reliable communication over the internet by breaking data into packets,
transmitting them, and reassembling them at the destination without data loss or
corruption.

HTTP (HyperText Transfer Protocol):


HTTP is the protocol used to transfer hypertext documents (e.g., web pages) over the
internet. It enables communication between a web browser and a web server.

b) Differentiate between the following:

Internet vs. WWW (World Wide Web):

Internet: A global network of interconnected computers that share


information and resources.

WWW: A service on the internet that provides access to web pages


and resources through browsers using protocols like HTTP.

Intranet vs. Extranet:

Intranet: A private network within an organization that restricts


access to internal users.

Extranet: An extended intranet that allows limited access to


authorized external users (e.g., partners, clients).

URL vs. Domain Name:

URL (Uniform Resource Locator): The complete web address used


to locate a specific resource on the internet (e.g.,
https://example.com/page).

Domain Name: A part of the URL that identifies the website (e.g.,
example.com).

c) Explain any 2 types of internet connection types:

Broadband:
A high-speed internet connection that can use technologies like DSL,
cable, or fiber optics. It offers continuous connectivity without
needing to dial in.

Mobile Data (4G/5G):

Internet access provided through mobile networks, enabling users to


connect wirelessly using cellular devices and hotspots.

d) What can a spreadsheet do?

Organize Data: Spreadsheets allow users to store, format, and manage


large amounts of data in a tabular format.

Perform Calculations: They can execute mathematical, statistical, and


logical operations using built-in functions and formulas.

Answers to Question Six

a) Advantages and disadvantages of using a computer:


Advantages:

Speed: Computers can process and analyze data quickly, saving time.

Accuracy: Computers perform tasks with high precision, reducing errors.

Disadvantages:

Dependence: Over-reliance on computers can cause productivity loss


during technical failures.

Cost: Purchasing, maintaining, and upgrading computers can be expensive.


b) Define data communication:

Data communication is the process of transmitting digital or analog data between two or more
devices through a communication medium (e.g., wired or wireless).

c) Fundamental characteristics of an effective data communication system:

Delivery: Ensures that data reaches the correct destination.

Accuracy: Ensures that transmitted data is free from errors.

Timeliness: Data must be delivered within an acceptable time frame.

Jitter: Refers to the variation in packet arrival times, which should be


minimized.

d) Differentiate between point-to-point and multipoint connection (with illustrations):

Point-to-Point Connection:

Direct connection between two devices (e.g., two computers connected with
a single cable).

Illustration: Computer A ↔ Computer B

Multipoint Connection:

A single connection shared among multiple devices (e.g., a LAN with multiple devices
connected to one network).

Illustration: Computer A ↔ Computer B ↔ Computer C

e) Three types of guided transmission media:

Twisted Pair Cable: Common in telephone networks and LANs.

Coaxial Cable: Used in cable television systems.

Fiber Optic Cable: High-speed transmission using light signals.


f) Define the term volatile and give one non-volatile memory:
Volatile Memory:
Memory that loses its contents when power is turned off (e.g., RAM).

Non-Volatile Memory:
Memory that retains data even without power (e.g., EEPROM, SSD).

g) Differentiate between RAM and Registers:

RAM (Random Access Memory):

A large, temporary storage used to hold data and programs while in use.

Slower and farther from the CPU compared to registers.

Registers:

Small, high-speed storage directly inside the CPU used for immediate data
processing.

Much faster but limited in size.

h) How would I reprogram an EEPROM vs. EPROM?

EEPROM (Electrically Erasable Programmable Read-Only Memory):

Can be erased and reprogrammed electronically without removing it from


the circuit.

EPROM (Erasable Programmable Read-Only Memory):

Requires exposure to UV light to erase data before reprogramming.

Answers to Question Seven


a) Define computer security:
Computer security refers to the protection of computer systems, networks, and data from
unauthorized access, theft, damage, disruption, or misuse. It encompasses measures to ensure
data integrity, confidentiality, and availability.

b) Major elements of computer security:

Confidentiality: Ensuring that sensitive information is only accessible to


authorized users.

Integrity: Protecting data from being altered or corrupted, ensuring


accuracy and reliability.

Availability: Ensuring that systems and data are accessible to authorized


users whenever needed.

c) Describe 3 computer threats or attacks and their countermeasures:

Virus/Malware: Malicious software that can corrupt files or disrupt system operations.

Countermeasure: Use updated antivirus software, avoid suspicious


downloads, and regularly update operating systems.

Phishing: Deceptive attempts to steal sensitive information (e.g., passwords) through fake
emails or websites.

Countermeasure: Educate users on identifying phishing attempts, and use


email filtering tools.

Denial-of-Service (DoS) Attack: Overloading a server or network to make it unavailable.

Countermeasure: Implement intrusion detection systems and use firewalls


to filter traffic.

d) Define data backup and describe 3 types:

Data Backup: The process of creating copies of data to protect against data loss due to failures,
attacks, or accidents.

Types of Backup:

Full Backup: A complete copy of all data, providing comprehensive


recovery but requiring more storage and time.
Incremental Backup: Only backs up data that has changed since the last
backup, saving time and storage.

Differential Backup: Backs up all data changed since the last full backup,
providing a middle ground between full and incremental backups.

e) Three types of firewalls:

Packet-Filtering Firewall: Filters incoming and outgoing data packets


based on predefined rules.

Proxy Firewall: Acts as an intermediary between users and external


networks, inspecting data at the application level.

Next-Generation Firewall (NGFW): Combines traditional firewall functions


with advanced features like intrusion prevention and deep packet inspection.

f) What do you understand by the term encryption?


Encryption is the process of converting plain text into coded or scrambled text (ciphertext) to
protect data from unauthorized access during storage or transmission.

g) Differentiate between symmetric and asymmetric encryption:

Symmetric Encryption:

Uses a single key for both encryption and decryption.

Faster but less secure due to the difficulty of securely sharing the key.

Asymmetric Encryption:

Uses a pair of keys: a public key for encryption and a private key for
decryption.

More secure but slower compared to symmetric encryption.


Answers to Question One

(a) Define a Computer:


A computer is an electronic device that processes data according to a set of instructions
(programs) to produce meaningful output (information). It can store, retrieve, and manipulate
data with speed and accuracy.

(2 Marks)

(b) Computers can transform data into information. Explain the activities performed by a
computer to produce information:

1. Input: Raw data is entered into the computer using input devices (e.g.,
keyboard, scanner).
2. Processing: The computer uses the central processing unit (CPU) to
manipulate, calculate, or analyze the data based on instructions in the
program.
3. Storage: Data is temporarily stored in memory (RAM) or permanently
in storage devices (e.g., HDD, SSD) during processing.
4. Output: The processed data (information) is presented to the user
through output devices like monitors, printers, or speakers.
5. Feedback: Some systems allow the output to be reprocessed for
further refinement or adjustments.

(5 Marks)

(c) Suggest the benefits that computerized systems bring to an organization:


1. Increased Efficiency: Automating repetitive tasks saves time and
reduces errors.
2. Improved Accuracy: Minimizes human error, ensuring data integrity.
3. Enhanced Communication: Facilitates email, messaging, and
collaborative tools for improved communication.
4. Data Management: Allows for easy storage, retrieval, and analysis of
large datasets.
5. Cost Savings: Reduces reliance on manual processes, cutting labor
costs in the long term.
6. Scalability: Easily accommodates organizational growth and changes.
7. Security: Provides tools for encrypting and protecting sensitive data.

(6 Marks)

(d) Seven characteristics of a computer system:

1. Speed: Computers perform tasks at incredibly high speeds compared


to humans.
2. Automation: Operates automatically once programmed, requiring
minimal user intervention.
3. Accuracy: Delivers precise and error-free results if input and
instructions are correct.
4. Storage Capability: Can store vast amounts of data for easy retrieval
and use.
5. Versatility: Performs a wide range of tasks, from calculations to
multimedia processing.
6. Connectivity: Allows systems and devices to interact and exchange
data over networks.
7. Diligence: Does not experience fatigue, enabling continuous operation
without loss of performance.

(7 Marks)

Answers to Question (b), (c), and (d):

(b) Advise your O.B on three factors to consider when buying a new computer:
Purpose/Usage:
Determine the main purpose of the computer (e.g., studies, programming, gaming, or basic
browsing). A student might need a laptop with good multitasking capabilities for
assignments, research, and light applications.

Specifications:
Consider key specifications such as:

Processor (CPU): A faster processor (e.g., Intel Core i5 or i7, AMD


Ryzen) ensures better performance.

RAM: At least 8GB of RAM for smooth multitasking.

Storage: SSDs (Solid State Drives) are faster and more reliable than
HDDs (Hard Disk Drives).

Portability and Battery Life:


For studies, a lightweight laptop with long battery life is essential, especially for students
who move between classes or study on the go.

(3 Marks)

(c) What is an Operating System?


An Operating System (OS) is system software that acts as an interface between the computer
hardware and the user. It manages hardware resources, provides services for application
software, and ensures efficient operation of the computer system.

(2 Marks)

(d) Five functions of an Operating System:

Process Management:
Controls and schedules the execution of programs, ensuring smooth multitasking.

Memory Management:
Allocates and manages memory space for programs and data during execution.

File System Management:


Manages the storage, retrieval, and organization of data in files on storage devices

Device Management:
Coordinates communication between hardware devices (e.g., printers, scanners) and the
computer.
Security and Access Control:
Protects data and resources from unauthorized access by enforcing passwords, encryption, and
user permissions.

(5 Marks)

Answers to Question (e) and (f):

(e) Advice on choosing an appropriate printer for KYU Computer Science Department:

Laser Printer:

Recommendation: Suitable for high-volume printing, especially for


text-heavy documents like reports or assignments.

Advantages: Fast printing speed, high-quality output for text, cost-


effective for bulk printing.

Inkjet Printer:

Recommendation: Ideal for printing color images, graphics, or


documents with visuals.

Advantages: Excellent print quality for photos and graphics,


affordable initial cost.

Limitation: Slower and costlier to operate for large volumes.

Dot Matrix Printer:

Recommendation: Suitable for specialized tasks like printing


invoices or forms where carbon copies are needed.

Advantages: Durable for continuous printing and can handle


multipart forms.

Limitation: Noisy and lower print quality compared to laser and


inkjet printers.
Advice Summary:
For a department with a high volume of text printing needs, a laser printer is the best option.
For occasional color or graphics printing, complementing it with an inkjet printer would be
practical.

(3 Marks)

(f) Two issues that could have caused the printer to not respond:

Connection Issues:

The printer may not be properly connected to the computer via USB
or the network (if it’s a network printer).

Printer Driver Problems:

The necessary driver for the printer may not be installed or might be
corrupted, preventing the computer from communicating with the
printer.

(2 Marks)

Answers to Question 3

(a) Importance of ICT in today's society:

Improved Communication:
ICT enables fast and efficient communication through email, video conferencing, and
messaging platforms.

Access to Information:
ICT provides access to vast amounts of data and knowledge through the internet,
benefiting education, research, and businesses.

Enhancing Business Operations:


ICT streamlines business processes, improves customer service, and enhances productivity
with tools like ERP systems and online transactions.
Facilitating Education:
ICT promotes e-learning platforms, virtual classrooms, and access to educational
resources, enabling remote and lifelong learning.

Health Improvements:
ICT supports telemedicine, electronic health records, and research in improving healthcare
delivery.

Boosting Government Services:


E-governance improves transparency, reduces corruption, and makes services more
accessible to citizens.

Social Impact:
ICT connects people globally, fosters innovation, and provides platforms for social and
economic development.

(7 Marks)

(b) Five threats to information in an organization:

Unauthorized Access:
Intruders or hackers gaining access to confidential data can lead to breaches and misuse of
information.

Countermeasure: Use strong authentication mechanisms and


access controls.

Viruses and Malware:


Malicious software can corrupt, steal, or delete organizational data.

Countermeasure: Install and regularly update antivirus software.

Data Loss:
Loss of information due to accidental deletion, hardware failure, or natural disasters.

Countermeasure: Regular data backups and disaster recovery


plans.

Phishing Attacks:
Cybercriminals trick employees into revealing sensitive data through fake emails or
websites.

Countermeasure: Educate staff and implement email filtering


solutions.

Insider Threats:
Employees or contractors misusing their access to compromise information.
Countermeasure: Enforce strict access controls and monitor user
activity.

(7 Marks)

(c) Explanation of the following terms:

Bit:

A bit (binary digit) is the smallest unit of data in computing,


represented as either 0 or 1. It is the building block of digital
communication.

Byte:

A byte consists of 8 bits and is used to represent a single character


(e.g., a letter or number) in digital systems. It is a fundamental unit
of storage.

Machine Language:

Machine language is the lowest-level programming language,


consisting of binary code (0s and 1s) that the computer's processor
can directly execute.

(6 Marks)

You might also like