COMPUTER
COMPUTER
Question 1
Disk drive: A device used to read from or write data to a disk, such as
a hard disk, floppy disk, or optical disk (CD/DVD).
UPS (Uninterruptible Power Supply): Provides backup power during
electricity outages, ensuring the computer runs smoothly without
sudden shutdowns.
b)
i) What is a mouse?
A mouse is an input device that allows users to interact with a computer
by controlling a pointer on the screen.
ii) Two types of mice:
Question 2
a) With a labeled diagram, show with arrows how the computer is related to both input
and output devices.
b)
c) Use a labeled diagram to show the relationship between the computer and input/output
devices.
(Refer to answer in 2a for a similar diagram.)
d)
Usage: CDs are mainly used for audio, while DVDs are used for video
and large files.
a) In an institution like Kyambogo University using the eKampus system, which type of
computer would you recommend and why?
Social Implications:
Economic Implications:
f) What do you understand by kernel mode and user mode in an operating system?
A
nswers to the Questions
Application Software:
System Software:
f) Describe the various input devices that can be used to input the following types of data:
1. Text: Keyboard.
2. Audio: Microphone.
3. Images: Scanner or camera.
4. Barcodes: Barcode scanner.
Answers to the Questions
Question Three
1. Superscript positions text slightly above the normal line (e.g., x²).
2. Subscript positions text slightly below the normal line (e.g., H₂O).
c) Describe any 2 ways a process can be created and 2 ways a process can be terminated:
Preemptive Scheduling:
The CPU can be taken away from a process, even if it is not finished (e.g., due to
higher-priority processes).
Non-Preemptive Scheduling:
Domain Name: A part of the URL that identifies the website (e.g.,
example.com).
Broadband:
A high-speed internet connection that can use technologies like DSL,
cable, or fiber optics. It offers continuous connectivity without
needing to dial in.
Speed: Computers can process and analyze data quickly, saving time.
Disadvantages:
Data communication is the process of transmitting digital or analog data between two or more
devices through a communication medium (e.g., wired or wireless).
Point-to-Point Connection:
Direct connection between two devices (e.g., two computers connected with
a single cable).
Multipoint Connection:
A single connection shared among multiple devices (e.g., a LAN with multiple devices
connected to one network).
Non-Volatile Memory:
Memory that retains data even without power (e.g., EEPROM, SSD).
A large, temporary storage used to hold data and programs while in use.
Registers:
Small, high-speed storage directly inside the CPU used for immediate data
processing.
Virus/Malware: Malicious software that can corrupt files or disrupt system operations.
Phishing: Deceptive attempts to steal sensitive information (e.g., passwords) through fake
emails or websites.
Data Backup: The process of creating copies of data to protect against data loss due to failures,
attacks, or accidents.
Types of Backup:
Differential Backup: Backs up all data changed since the last full backup,
providing a middle ground between full and incremental backups.
Symmetric Encryption:
Faster but less secure due to the difficulty of securely sharing the key.
Asymmetric Encryption:
Uses a pair of keys: a public key for encryption and a private key for
decryption.
(2 Marks)
(b) Computers can transform data into information. Explain the activities performed by a
computer to produce information:
1. Input: Raw data is entered into the computer using input devices (e.g.,
keyboard, scanner).
2. Processing: The computer uses the central processing unit (CPU) to
manipulate, calculate, or analyze the data based on instructions in the
program.
3. Storage: Data is temporarily stored in memory (RAM) or permanently
in storage devices (e.g., HDD, SSD) during processing.
4. Output: The processed data (information) is presented to the user
through output devices like monitors, printers, or speakers.
5. Feedback: Some systems allow the output to be reprocessed for
further refinement or adjustments.
(5 Marks)
(6 Marks)
(7 Marks)
(b) Advise your O.B on three factors to consider when buying a new computer:
Purpose/Usage:
Determine the main purpose of the computer (e.g., studies, programming, gaming, or basic
browsing). A student might need a laptop with good multitasking capabilities for
assignments, research, and light applications.
Specifications:
Consider key specifications such as:
Storage: SSDs (Solid State Drives) are faster and more reliable than
HDDs (Hard Disk Drives).
(3 Marks)
(2 Marks)
Process Management:
Controls and schedules the execution of programs, ensuring smooth multitasking.
Memory Management:
Allocates and manages memory space for programs and data during execution.
Device Management:
Coordinates communication between hardware devices (e.g., printers, scanners) and the
computer.
Security and Access Control:
Protects data and resources from unauthorized access by enforcing passwords, encryption, and
user permissions.
(5 Marks)
(e) Advice on choosing an appropriate printer for KYU Computer Science Department:
Laser Printer:
Inkjet Printer:
(3 Marks)
(f) Two issues that could have caused the printer to not respond:
Connection Issues:
The printer may not be properly connected to the computer via USB
or the network (if it’s a network printer).
The necessary driver for the printer may not be installed or might be
corrupted, preventing the computer from communicating with the
printer.
(2 Marks)
Answers to Question 3
Improved Communication:
ICT enables fast and efficient communication through email, video conferencing, and
messaging platforms.
Access to Information:
ICT provides access to vast amounts of data and knowledge through the internet,
benefiting education, research, and businesses.
Health Improvements:
ICT supports telemedicine, electronic health records, and research in improving healthcare
delivery.
Social Impact:
ICT connects people globally, fosters innovation, and provides platforms for social and
economic development.
(7 Marks)
Unauthorized Access:
Intruders or hackers gaining access to confidential data can lead to breaches and misuse of
information.
Data Loss:
Loss of information due to accidental deletion, hardware failure, or natural disasters.
Phishing Attacks:
Cybercriminals trick employees into revealing sensitive data through fake emails or
websites.
Insider Threats:
Employees or contractors misusing their access to compromise information.
Countermeasure: Enforce strict access controls and monitor user
activity.
(7 Marks)
Bit:
Byte:
Machine Language:
(6 Marks)