0% found this document useful (0 votes)
69 views26 pages

COMPUTER SCIENCE - Exam N Answers

The document outlines the joint examinations for Catholic secondary schools in Dar es Salaam, specifically for the Computer Science subject for Form Five in 2024. It includes instructions for the exam, a breakdown of sections A and B with various questions covering topics such as computer systems, programming, data communication, and software characteristics. Additionally, it provides a marking scheme for the questions presented.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views26 pages

COMPUTER SCIENCE - Exam N Answers

The document outlines the joint examinations for Catholic secondary schools in Dar es Salaam, specifically for the Computer Science subject for Form Five in 2024. It includes instructions for the exam, a breakdown of sections A and B with various questions covering topics such as computer systems, programming, data communication, and software characteristics. Additionally, it provides a marking scheme for the questions presented.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

DAR ES SALAAM CATHOLIC SECONDARY SCHOOLS ASSOCIATION (DACASSA)

JOINT EXAMINATIONS FOR CATHOLIC SCHOOLS (JECAS)


FORM FIVE – ANNUAL EXAMINATION - 2024
COMPUTER SCIENCE
136
Time: 3:00 Hours Date: Monday, 25th March 2024 p.m.
________________________________________________________________________________

Instructions
1. This paper consists of sections A and B with a total of nine (9) questions.
2. Answer all questions in both section A and section B.
3. Section A carries seventy (70) marks and section B carries thirty (30) marks.
4. Cellular phones and any unauthorized materials are not allowed in the examination room.
5. Write your Examination Number on every page of your answer booklet(s) provided.

Page 1 of 4
Form Five Jecas – 2024
SECTION A: (70 Marks)
Answer all questions in this section.
1. a) Mr. Frank as an IT technician at TCRA whose responsibility is to troubleshoot and maintain the
computer and its information system for the organizations, if he wants to purchase new input
devices. Explain three major issues Mr. Frank should consider first. (06 Marks)
b) Power supply fan is not working and it emits a lot of sound. What will be the problem?
(01 Mark)
c) Suppose your teacher gave you the software file into flash disk. The size of the file was 2GB.But
when you send it into your computer the message appeared as ―” the disk space is full‖”. Your
teacher adviced you to delete some folders from your computer in order to have enough space.
You deleted the folder which has 3GB but when you send again the file still it showed the same
message. From the above scenario, briefly explain why the file failed to be transferred from the
flash disk into your computer? Three points. (03 Marks)
2. (a) A system controls the flow of vehicles through a barrier based on three lights, A, B and C.
When a light is red, the signal is zero. When a light is green, the signal is one. The barrier will
open when the output X is one. The barrier opens if either: light A is red and lights B and C are
both green or light A is green and lights B and C are both red
(i) Design a logic circuit for the system. (03 Marks)
(ii) Complete the truth table for the system. (02 Marks)

(b) Use Boolean laws of algebra to simplify the following Boolean expression
(A  B  C)(A  BC) (02 Marks)
(c) Assume the following numbers are belonging to the available number systems X 2, Y10 and
Z16
(i) What number systems does X2 , Y10 and Z16 are belonging (01 mark)
(ii) If Y = 375, what will be the value of Z? (01 Mark)
(iii) If X = 110101, what will be the value of Y? (01 Mark)

3. (a) What is meant by the followings? Give examples in each case.


(i) Superscript (01 Mark)
(ii) Subscript (01 Mark)
(b) In a spreadsheet, the formula =IF(B1>10, B1*77, B1*50) is entered in a cell. Interpret the
results. (02 Marks)
(c) With examples differentiate the following
i. Formula and Function as used in excel. (1.5 Marks)
ii. Name box and an active cell (1.5 Mark)

(d) Briefly explain with examples three types of cell reference (1.5 @ 0.5 Marks)

Page 2 of 4
Form Five Jecas – 2024
(e) The following text in the box below was composed using a word processor. The current
cursor position is between the word “powerful” and “way”

Video provides a powerful way to help you prove your point. When you click
Online Video, you can paste in the embed code for the video you want to add.

Describe what happens to the text in the box above when each of the following keyboard keys are
pressed.
i) Tab (0.5 Mark)
ii) Enter (0.5 Mark)
iii) Home (0.5 Mark)

4. a) Tickets are sold for a concert at $20 each. If 10 tickets are bought then the discount is
10%; if 20 tickets are bought the discount is 20%. No more than 25 tickets can be bought in a
single transaction. Use pseudo-code and flow chart to write an algorithm to calculate the cost of
buying a given number of tickets. (07 Marks)

b) Design flowchart and pseudo-code which will check-for-the-alarm-time sub-system.


(03 Mark)

5. (a) With examples explain three ways used to embed JavaScript into HTML page (03 Mark)

(b) Explain the use of “action” attribute and the difference between POST method and GET
method in HTML form. (03 Mark)
(c) Write HTML tags to display the following house plan. (04 Mark)

Page specification:-
(i) Use heading level (h1) to the title “My house”.
(ii) The colour of word “Kitchen” should be green.
(iii) The sitting room should have a brown background colour.
(iv) Set the height and width of the table be 150 and 250 respectively.
(v) Set the width of the horizontal line be 250.
Page 3 of 4
Form Five Jecas – 2024
6. (a) What is meant by the term “Generation” with reference to programming languages?
(2.5 Marks)
(b) Describe the steps in the execution of a C++ program. (04 Marks @1)
(c) Write code example of the following C++ statements
(i) Switch case statement. (01 Mark)
(ii) Input and displaying element from an array (1 Mark)

(d) What will be the output of the following C++ program? (1.5 Marks)

#include<iostream>
using namespace std;
int main()
{
int i=3, j;
while(i)
{
cout<<"i="<<i<<"";
for(j=0;j<i;j++)
cout<<"j="<<j<<"";
cout<<'\n';
i--;
}
system("pause");
return 0;
}

7. (a)Define multiplexing as used in data communication. (02 Marks)

(b)With example explain point to point connection. (02 Marks)

(c)Explain three modes of data transmission. (03 Marks)

(d) Outline three control measures which may be used to protect an information system against
viruses. (03 Marks)

SECTION B: (30 Marks)


Answer two (2) questions from this section.
8. Program design aims at producing good software. Describe six characteristics of good software.
(15 Marks)
9. The use of computers has many advantages and disadvantages, as a computer science student explain
the advantages and disadvantages of computer use in a current digital world
(15 Marks)

Page 4 of 4
Form Five Jecas – 2024
136/1 COMPUTER SCIENCE 1
MAKING SCHEME
1.(a)Resource managed by an operating system(3marks@1mark)
 processor
 file
 main memory(RAM)
 input/output devices and their ports
 secondary storage devices
 communication devices
 communication ports

(b) Explain three importance of data backup (3marks)

Data backup is a critical aspect of data management and protection for individuals, businesses,
and organizations. Here are five important reasons why data backup is crucial:
 data enables the user to create copies of data and programs(0n separate storage device) to
avoid losing important data and program files

 Data Loss Prevention: Accidents, hardware failures, malware, and other unforeseen
events can lead to data loss. By regularly backing up data, you ensure that you have a
copy of your information in a safe location. This helps prevent permanent data loss and
minimizes the impact of unexpected incidents.
 Disaster Recovery: Natural disasters like floods, fires, earthquakes, or even human-made
disasters such as theft or cyberattacks can severely damage or destroy your primary data
storage. Data backups, especially if stored offsite or in the cloud, enable you to recover
your data and resume operations quickly in the aftermath of a disaster.
 Business Continuity: For businesses, data is often the lifeblood of their operations. Data
backup is essential for maintaining business continuity. In the event of data loss or
disruption, having backup copies of critical data ensures that essential functions can
continue, minimizing downtime and financial losses.
 Data Version Control: Data backups provide the ability to recover older versions of files
and data. This is crucial in situations where data corruption or errors are discovered after
the fact. Data version control allows you to roll back to a previous, error-free state, which
can be especially important for software development, document management, and data
analysis.
 Regulatory Compliance: Many industries and businesses are subject to regulations that
require data retention and protection. Failing to comply with these regulations can
result in legal consequences and fines. Data backup and retention policies help

Page 1 of 20
organizations meet these compliance requirements and demonstrate due diligence in
protecting sensitive information.

(c) (c)

The Control Unit (CU) is a crucial component of the Central Processing Unit (CPU) in a
computer. It plays a fundamental role in coordinating and controlling the operations of the
CPU. Here are five key functions of the Control Unit:

1. Instruction Fetch: The CU fetches program instructions from memory (typically RAM)
and loads them into the CPU's instruction register. It identifies the memory address of
the next instruction to be executed, ensuring that instructions are processed in the
correct sequence.
2. Instruction Decoding: After fetching an instruction, the CU decodes it to determine the
operation it represents and the operands involved. This process involves breaking down
the instruction into its constituent parts, such as opcode and operands, to understand
what action needs to be performed.
3. Execution Control: The CU controls the execution of instructions by coordinating
various components of the CPU, such as the Arithmetic Logic Unit (ALU) and registers.
It sends signals to the appropriate parts of the CPU to perform the required data
manipulation or arithmetic/logic operations based on the decoded instruction.
4. Register Management: The CU manages the CPU's registers, which are small, high-speed
storage locations used for temporary data storage and manipulation. It directs the loading
of data into registers, arithmetic operations, and the transfer of data between registers and
memory.
5. Program Counter (PC) Management: The CU keeps track of the program's execution by
managing the Program Counter (PC). The PC is a special register that stores the memory
address of the next instruction to be fetched. The CU updates the PC to ensure the CPU
proceeds to the next instruction in the correct sequence

 Coordinating all activities and ensuring that instructions are executed in the correct order,
which is essential for the proper functioning of a computer system.

Page 2 of 20
2.(a)(2marks@1mark)

Page 3 of 20
(b) (1.5 marks)

Page 4 of 20
(b) Mention and explain five control used in visual basic programming (2.5 marks)

Page 5 of 20
(c) Use while loop Write VB program that return a sum of integers raised to a given power.
Example if user enter 234 and power of 2 the result will be 29. (4 marks). (4 marks)
Private Sub Command1_Click()
Dim sum, num, last, power As Integer
num = Text1.Text
power =
Text2.Text Do
While num > 0 last
= num Mod 10
sum = sum + last ^ power
num = num \ 10
Loop
Text3.Text =
sum End Sub

Page 6 of 20
3.a) Reserved Word: A reserved word, also known as a keyword, is a term that has a predefined
and reserved meaning in the C++ language. These words are part of the C++ language's syntax
and are used to define various elements, such as control structures, data types, and function
definitions. They cannot be used for any other purpose within the program and have special
meanings that are built into the language.
Example: The word "if" is a reserved word in C++. It is used to define conditional statements.,
if (condition) {
// Code to be executed if the condition is true
//"if" is a reserved word used to create a conditional statement.
}

b) Keyword: In C++, the terms "reserved word" and "keyword" are often used interchangeably.
Keywords are essentially reserved words, and they have predefined meanings within the C++
language.

Example: "int" is a keyword in C++. It is used to declare integer data types. In the following
code, "int" is a keyword used to declare an integer variable.

int myVariable = 42;

c) Constants: Constants in C++ are values that do not change during the execution of a program.
They are fixed and unalterable. Constants can be of various types, including numeric constants,
character constants, and string constants. Numeric constants can be further categorized into
integer constants and floating-point constants.

Example: Numeric constants such as 42 or 3.14 are examples of constants in C++. They have
fixed values that do not change during program execution.

const int myConstant = 42; // Integer constant


const double pi = 3.14; // Floating-point constant

d) Identifiers: Identifiers in C++ are names used to represent various program elements, such as
variables, functions, classes, and user-defined types. An identifier must adhere to certain rules,
like starting with a letter or underscore, and it should not be a reserved word or keyword.
Identifiers are case-sensitive, meaning that "mimi" and "MIMI" are treated as different
identifiers.

Example: "mimi" is an identifier used to represent a variable in the C++ program.

int mimi = 42;

Page 7 of 20
3B
#include <iostream>
using namespace std;
int main() {
// Initialize account balance and service charge
double accountBalance = 5000000.0; // Initial balance, change as needed const
double maxWithdrawal = 2000000.0;
const double maxChargeAmount = 450000.0;
const double serviceChargePercentage = 0.08;
const double insufficientFundCharge = 1300.0;

// Input the amount to be withdrawn


double withdrawalAmount;
cout << "Enter the amount to be withdrawn (Tshs): ";
cin >> withdrawalAmount;

if (withdrawalAmount > maxWithdrawal) {


cout << "The maximum withdrawal limit is " << maxWithdrawal << " Tshs." << endl;
} else if (withdrawalAmount <= 0) {
cout << "Invalid withdrawal amount." << endl;
} else if (accountBalance <= 0) {
cout << "Insufficient funds. Unable to withdraw." << endl;
} else if (accountBalance < withdrawalAmount) {
cout << "Insufficient funds. Withdrawal with a service charge of " <<
insufficientFundCharge << " Tshs." << endl;
accountBalance -= insufficientFundCharge;
} else {
double serviceCharge = 0.0;
if (withdrawalAmount > maxChargeAmount) {
serviceCharge = (withdrawalAmount - maxChargeAmount) * serviceChargePercentage;
}

if (accountBalance < (withdrawalAmount + serviceCharge)) {


cout << "Insufficient funds to cover the service charge." << endl;
} else {
accountBalance -= (withdrawalAmount + serviceCharge);
cout << "Withdrawal successful. Account balance: " << accountBalance << " Tshs." <<
endl;
}
}
return 0;
}

Page 8 of 20
4.(a)When creating tables in HTML, you typically use a combination of HTML tags to
structure and format the table. Here are three basic HTML tags commonly used with the
<table> element:

1. <tr> (Table Row): The <tr> tag is used to define a table row within a table. Each row in an
HTML table is enclosed by these tags. Within each <tr>, you include one or more <td> (table
data) or <th> (table header) elements to define the cells in that row.(1MARK)
Example:
<table>
<tr><td>Row 1, Cell 1</td> <td>Row 1, Cell 2</td> </tr>
<tr><td>Row 2, Cell 1</td><td>Row 2, Cell 2</td> </tr>
</table>
2. <td> (Table Data): The <td> tag is used to define the standard table data cell within a table
row. This tag is used to represent the content of individual cells in the table. .(1MARK)
<table>
<tr>
<td>Row 1, Cell 1</td>
<td>Row 1, Cell 2</td>
</tr>
</table>

3. <th> (Table Header): The <th> tag is used to define table header cells, typically found in the
first row or the first column of the table. It is used to indicate that the content within these cells
represents headers or labels for the data in the table. .(1MARK)

Example:
<table>
<tr>
<th>Name</th>
<th>Age</th>
</tr>
<tr>
<td>John</td>
<td>30</td>
</tr>
</table>
These basic HTML tags are used in combination with the <table>element to create structured
tables in HTML, specifying rows, data cells, and header cells as needed for organizing and
presenting tabular data on web pages.

Page 9 of 20
(b)(3MARKS@1MARK)
 Inline JavaScript: Inline JavaScript is included directly within the HTML file, typically
within the <script> element in the document's <head> or <body> section. This method is
useful for small scripts or for making quick changes to the HTML document.
<!DOCTYPE html>
<html>
<head>
<title>Inline JavaScript Example</title>
<script>
// Inline JavaScript code
function greet() {
alert("Hello, World!");
}
</script>
</head>
<body>
<button onclick="greet()">Click Me</button>
</body>
</html>
 External JavaScript File: You can create a separate JavaScript file with a .js
extension and link it to your HTML document using the <script> element. This method
is suitable for larger scripts and promotes code organization and reusability.
Example: Let's assume you have a JavaScript file named script.js with the following content:
// script.js
function greet() {
alert("Hello, World!");
}
Then, in your HTML file, you include the external JavaScript file like this:
<!DOCTYPE html>
<html>
<head>
<title>External JavaScript Example</title>
<script src="script.js"></script>
</head>
<body>
<button onclick="greet()">Click Me</button>
</body>
</html>

Page 10 of 20
(c)(4MARKS)
<html>
<head><title></title>
<script>
function me()
{
document.getElementById ("m").innerHTML='if you fell down yesterday stand up today and
if you haven’t received you own blessings, don’t despair. <br>Say to yourself "My time is
coming"';
}
</script></head>
<body bgcolor="blue"><form>
<h1>When Things Fall Apart</h1>
<p>When things fall apart and we’re on the verge of we know not what, the test of each of
us is to stay on that brink and not concretize. <br><b>The spiritual journey is not about
heaven</b> and finally getting to a place that’s really swell.</p>
<p id="m"><font color="yellow">Life hack: Don’t lose faith when you see others
receiveanswers to their prayers</font></p><br>
<input type="button" name="" value="View Me" onclick="me ()">
</form></body></html>

5.(a)

Page 11 of 20
(b)(4MARKS@1MARK)

Page 12 of 20
Client-Server and Peer-to-Peer (P2P) architectures have fundamental differences in their structure,
organization, and functionality. Here are ten differences between the two:
1. Centralized vs. Decentralized Control:
o Client-Server: Centralized control is a defining characteristic, with servers
managing resources and clients requesting services.
o Peer-to-Peer (P2P): Decentralized control prevails, as peers are equal
and share resources among themselves.
2. Resource Management:
o Client-Server: Server-centric resource management, with servers
controlling and distributing resources.
o Peer-to-Peer (P2P): Resource sharing occurs directly between peers.
3. Scalability:
o Client-Server: Scalable through server-side resources and load balancing.
o Peer-to-Peer (P2P): Scalability is more challenging, as it depends on the
capabilities of individual peers.
4. Single Point of Failure:
o Client-Server: Vulnerable to server failures or downtime, which can disrupt
services.
o Peer-to-Peer (P2P): Less susceptible to single points of failure, as
resources are distributed across peers.
5. Security:
o Client-Server: Centralized security control is easier to implement and manage.
o Peer-to-Peer (P2P): Security depends on individual peers, making it more
complex and potentially less secure.
6. Control Over Data:
o Client-Server: Server administrators have centralized control over data.
o Peer-to-Peer (P2P): Data control is distributed across multiple peers.
7. Communication Overhead:
o Client-Server: Typically lower communication overhead, as servers handle
resource management.
o Peer-to-Peer (P2P): Higher communication overhead due to the need for
direct peer interactions.
8. Resource Allocation:
o Client-Server: Resources are explicitly allocated and managed by the server.
o Peer-to-Peer (P2P): Resources are shared among peers without centralized
allocation.
9. Use Cases:
o Client-Server: Often used in services like web hosting, email servers, and
centralized databases.
o Peer-to-Peer (P2P): Commonly used for file sharing, distributed computing,
and real- time communication.
10. Privacy and Anonymity:
o Client-Server: Server-based services may have access to user data, potentially
affecting privacy.
o Peer-to-Peer (P2P): Provides more privacy and anonymity as data is not
centrally controlled.
These differences reflect the architectural variances between client-server and peer-to-peer
systems, and the choice between them depends on specific requirements and objectives for a
Page 13 of 20
given application or network.

Page 14 of 20
6.(a) Queue is an abstract data structure somewhat similar to stacks. Unlike stacks a queue is open
at both ends while stacks is an abstract data type and is a linear data structure that can be accessed
only at one of its end for storing and retrieving data.(2marks examples 1mark)

Stacks and Queues are both abstract data structures used in computer science and
programming, but they have different ways of organizing and accessing data. Here are the key
differences and one real-world example for each:
Stacks:
1. Order of Access:
o Stacks: Follow the Last-In-First-Out (LIFO) order. The most recently added item
is the first to be removed.
Real-World Example:
 A stack is similar to a stack of plates. You add a plate to the top of the stack, and when
you want to take a plate, you take it from the top. The last plate added is the first one you
take off.
Queues:
1. Order of Access:
o Queues: Follow the First-In-First-Out (FIFO) order. The item that has been in the
queue the longest is the first to be removed.
Real-World Example:
 A queue is similar to people waiting in line at a grocery store checkout. The person who
joins the line first is the first to be served, and the person who joins last is the last to be
served.
In summary, the primary difference between stacks and queues lies in the order of access.
Stacks use LIFO, where the last item added is the first to be accessed, while queues use FIFO,
where the first item added is the first to be accessed. These data structures are used in various
computer science and software engineering applications to solve specific problems efficiently.

(b) Factors to consider when selecting a data structure (3marks@1mark)

 Type of information to be stored


 The uses of data or information
 Ways or methods to organize the data
 The aspects of memory and storage arrangement plan and their management

Page 15 of 20
(c)(4MARKS)

7.(a)What do you understand the meaning of information system(IS) (2marks)

Information system is a combination of hardware, software, infrastructure and trained


personnel organized to facilitate planning, control, coordinate and decision making in an
organization.
An information system is made of different components that work together to provide value to an
organization; it includes hardware, software, data, people and procedure
An Information System (IS) is a set of interconnected components that work together to collect,
store, process, and distribute data or information within an organization or across various
entities. Information systems play a crucial role in managing and processing data to support
decision-making, business operations, and other activities.

Page 16 of 20
(b) Today’s information systems come in various shapes, size and functions and cover a variety
of scopes, While some information systems are unique and others vary somewhat from one
organization to another. Explain four types of information systems.

TRANSACTION PROCESSING SYSTEMS (TPS) is an information system that


captures and processes data from day to day business activities.it ensure that a business
transaction is completed successfully and keeps track of transaction using a database.
MANAGEMENT INFORMATION SYSTEM(MIS) Is used to coordinate, control, analyse and
visualise information in an organization.MIS supports the management level of organization
where by managers can access various reports such as performance reports. MIS depend on TPS
for their data.
A DECISION SUPPORT SYSTEM(DSS) is an information system that aids in the decision-
making process in an organisation.It assists people in making decision regarding problem that
are fast- changing and not clearly stated in advance at the management, operations and planning
levels of an organisation.
EXECUTIVE SUPPORT SYSTEM(ESS) or Executive Information System(EIS) is the
computer based information systems that enable top managers or senior executives to quickly
access internal and external data, critical to strategic decision making and other executive duties

Page 17 of 20
(c) Use the following entity set with its attributes to answer the questions
I. Represent entity set into its equivalent relation table, (2 marks)
Students TABLE
studentName studentIdentity class major

II. Write SQL query to create students database table, (1 marks)


CREATE TABLE Students
(studentIdentity int,
class varchar(255),
major varchar(255),
);

III. Write SQL insert data into students table (2 marks)


INSERT INTO Students (studentName, studentIdentity, class,major)
VALUE (‘JOHN’, ‘001’, ‘FORM VI’);

IV. Write SQL query required to retrieve data from students table. (2 marks)

SELECT *FROM Students

SECTION B(30MARKS)

8. Imagine you are the part of the IT department at Ngorongoro University, where technological
advancements are a key focus. With the Ngorongoro IT department gearing up for an upgrade of its
computer lab, you have been tasked with ensuring that the disposal of the old computers and monitors
aligns with the university's sustainability goals. As a member of the IT team, how can you approach
the disposal of the old computers and monitors in a manner that minimizes our environmental
footprint and reflects our commitment to sustainability within the IT department? (15 marks)

Introduction: Define E-west or ICT WASTE plus Introduction sentences (1.5 marks)
Body four points (12marks @ 3Marks)
Conclusion (1.5 marks)

Introduction
E-WASTE: Term for any electrical or electronic appliance that has reached its end-of-life.
ICT WASTE refers to the computer and its peripherals, communication devices and their
peripherals that reached their end of life.

Page 18 of 20
Body four points
Recycling Programs, Take some time to look into recycling options provided by electronic
manufacturers or local recycling facilities. These programs are like community guardians for our
old electronics, ensuring they get a second chance at being useful without burdening the
environment.
Donate Working Equipment, Consider the potential of your old computers and monitors to
bring joy and learning to others. Donating them to schools or organizations in need is like passing
on the torch of knowledge, extending the life of the equipment while fostering educational
opportunities for others.
Seek Refurbishment Opportunities, Think of refurbishment as giving our old electronics a new
lease on life. By exploring refurbishment options, we can breathe new life into these devices,
making them usable again and reducing the need for new hardware, which can be costly both
financially and environmentally.
Repurpose Components, Get creative with repurposing! Instead of seeing old components as
obsolete, consider how they could be transformed for new uses within the school. It's like giving
these components a chance to shine in a different role, reducing waste and maximizing their
potential.
Trade-In Programs, Trade-in programs are like little exchanges of gratitude. By participating in
these programs, we not only get a discount on new purchases but also ensure that our old
equipment finds a new home where it can continue to be useful.
Sell, Consider turning your old computers and monitors into an opportunity. Selling them can be
like giving them a chance to start a new journey with someone else who might find value in them.
Conclusion
when upgrading our computer lab at Ngorongoro University's IT department, it's essential to
consider environmentally friendly disposal methods for the old computers and monitors. These
approaches not only help minimize electronic waste but also contribute to the extended use of
resources, fostering a culture of environmental responsibility.

9. Describe briefly the four positive and four negative impacts of ICT in our life with the reference
to communication, industrial production, health and cultural changes.

Answers
Introduction: Define E-west or ICT WASTE plus Introduction sentences – 1.5marks
Body (8 marks@ 1.5 marks)
Four positive Four points
Four Negative points
Conclusion 1.5 marks

Page 19 of 20
positive
Education Made Easy, ICT has transformed the education sector by providing access to vast
amounts of information through the internet, enabling online courses, digital textbooks, and
educational apps. This makes learning more accessible, flexible, and personalized, catering to
diverse learning styles and needs. Interactive multimedia resources, virtual classrooms, and e-
learning platforms enhance engagement and understanding among students.

Improved Healthcare with Advanced IT Systems, Integration of advanced IT systems in


healthcare, such as Electronic Health Records (EHRs), telemedicine, medical imaging, and
wearable devices, has revolutionized patient care. EHRs enable seamless sharing of patient
information among healthcare providers, leading to more informed decision-making and
coordinated care. Telemedicine allows remote consultations, diagnosis, and monitoring,
improving access to healthcare services, especially in remote or underserved areas. Medical
imaging technologies aid in accurate diagnosis and treatment planning, while wearable devices
facilitate real-time monitoring of vital signs and health metrics, promoting preventive care and
early intervention.

Increased Industrial Production, ICT tools such as automation, robotics, and data analytics
have streamlined industrial processes, leading to increased productivity and efficiency. This
results in lower production costs, faster turnaround times, and higher quality products.

Efficient Financial and Business Management, ICT has streamlined financial and business
processes through various tools and platforms. Mobile banking and payment systems enable
convenient and secure transactions, reducing the need for physical visits to banks. Automated
teller machines (ATMs) provide round-the-clock access to banking services, enhancing
convenience for customers. Additionally, digital accounting software, Enterprise Resource
Planning (ERP) systems, and Customer Relationship Management (CRM) software optimize
business operations, leading to improved efficiency, cost savings, and better customer service.

Timely Distribution of Information and Communication, ICT facilitates timely distribution


of information and communication through various media and platforms. Social networks, emails,
instant messaging apps, and online forums enable rapid dissemination of information, fostering
collaboration, knowledge sharing, and community engagement. Additionally, ICT tools like
content management systems (CMS), digital signage, and online publishing platforms facilitate
the creation, management, and distribution of content across different channels, reaching a
broader audience efficiently.

Remote Working, With the advancement of ICT, remote working has become increasingly
feasible and prevalent. Collaboration tools like video conferencing, project management
software, and cloud storage enable remote teams to communicate, collaborate, and coordinate
work effectively, regardless of geographical barriers. This flexibility in work arrangements

Page 20 of 20
promotes work-life balance, reduces commuting time and costs, and enhances productivity and
job satisfaction.

Negative.

Prolonged use of computer and related devices can lead to digital eyes strain, dry eyes, blurred
vison, headaches, and shoulder and net pain.

Improper disposal of ICT end-of-life electronic devices can have significant health-related
consequences for both humans and the environment, these toxic chemicals can leach into the soil,
water, and air, posing health risks to humans and wildlife. Exposure to these chemicals can lead
to various health problems, including neurological disorders, respiratory issues, reproductive
problems, and developmental abnormalities.

Social Isolation, While ICT facilitates communication and connectivity, excessive reliance on
digital communication channels can lead to reduced face-to-face interaction, potentially
contributing to social isolation and loneliness.

Privacy Concerns, IT devices and online platforms collect vast amounts of personal data, can
compromise individuals' privacy rights and expose them to identity theft, cyberbullying, and other
forms of online harassment.
Job Displacement: Automation and technological advancements can lead to job displacement.

Page 21 of 20
10. (a) Describe two types of attack in computer security
Answer (5 marks)
 Interception
 Interruption
 Modification (alteration)
 Fabrication

(b) Consider any four emerging technologies; discuss their impact on people in Tanzania now
and in the future (10 marks)
Answer
 Artificial intelligence
 Machine learning
 Autonomous vehicles
 Virtual reality
 Automate jobs that humans previously perfomed. Eg use of robots
 Diagnose and monitor patients’ health eg wearable devices

Page 22 of 20

You might also like