Share this:

SET ONE:

  1. (a). Write the acronym ICT in full. (01 mark)
  • Information, Communications Technology

(b). Mention two ways ICT can be used to improve teaching and learning.

  • marks)
    • Computer-based training, which includes:
  • Computer-Assisted Instructions (CAI), so that teachers can use computers and other IT equipment to present teaching materials in a more interesting way.
  • Computer-Assisted Learning (CAL), so that students can use computers and appropriate software to learn at their own pace.
  • Computer-Assisted Assessment (CAA), which may reduce the time and labor to mark the answer scripts.
  • Distance learning through computer-based training and Web-based training.
  • Simulations of experiments or real-life situations that may be hazardous.
  • Electronic library system for searching, borrowing, and returning books.
  • The School Administrationand Management System (SAMS) for keeping records of students and producing report cards or other related documents.

(c). Give two ways ICT has affected work today. (02 marks)

  • It has led to unemployment among workers.
    • It has led to job displacement.
    • It has improved work space environment and efficiency.
    • It has led to working from home away from standard offices (telecommuting).
    • It has increases presence of workflows 24/7.
    • It has led to isolation of workers.
    • It has led to loss of face – to – face interaction amongst workers even in the same company
  • (a). Give the difference between soft copy and hard copy. (02 marks)
  • Soft copy refers to a copy of work still on a computer or stored in a digital or electronic form, while, Hard copy refers to a copy of work printed and kept in a more permanent way of physical media like printing papers, plastic plates, e.t.c.

2

(b). Mention two examples of display devices commonly used today. (02 marks)

  • Monitor.
    • Projector.
    • Smart board.

(c). State one advantage of using a softcopy over a hard copy. (01 mark)

  • It stores very little space
    • It is a form that allows formatting and editing of content. ü It can easily be transported from place to place.
  • (a). Mention any three components found inside a computer’s system unit.

(03 marks)

Central Processing Unit. Mother board. Memory chips. ROM BIOS. CMOS battery.Buses. Expansion slots. Power unit. Drives.

(b). (i). What are computer peripheral devices? (01 mark)

  • These are external hardware components that are connected onto a systems case.

(ii). State one example of a peripheral device. (01 mark)

Speakers. Barcode reader. ü MIDI. ü OCR OMR Scanner.Printer. Projector. Digital camera. QR code reader. Smart / Swipe card reader.
  • (a). Define a computer laboratory. (02 marks)
  • A computer laboratory is a place where students learn practical uses of computers, such as programming or how to use a spreadsheet program.

(b). Give two ways a user can be safeguarded against accident while in a lab. (02marks)

  • Should not run in a computer laboratory.
    • Should avoid eating and drinking in a computer laboratory.
    • Should avoid connecting and disconnection devices.
    • Should insulate all wires and cables in a laboratory.
    • Should install lightening arrestors.
    • Should install fire detection equipment.

3

(c). Mention one way a computer resource can be abused. (01 mark)

  • Through software piracy.
    • Through defacing hardware components.
    • Through using institution resources for personal gain.
    • Through misrepresenting content.
    • Through giving away institution information without permission.
    • Picking and taking equipment, software and other resources from the institution. ü Miss using consumables like printing papers, tonner, e.t.c.
  • (a). Give the difference between cold and warm booting. (02 marks)
  • Cold booting involves starting a computer that was previously off, while; warm booting involves the starting up of a computer that was previously on.

(b). Mention three reasons for restarting a computer. (03 marks)

  • Commonly carried out to recover from errors that cannot be recovered.
    • When a computer locks or freezes.
    • After installing of certain new software program.
    • After installing a new hardware device like a flash disk.
    • After uninstalling a hardware device.
    • After uninstalling a software program.
    • When the computer slows down.
    • After changing CMOS or BIOS setup.
    • When a computer has a virus, it can constantly restart itself.
  • (a). Mention any three activities that can be done on a computer file. (03 marks)
Edit. Delete. Update. Send a file. Combine / split a file. Open / close a file. Zip / compress a file.Rename a file. Convert from one format to another e.g. From .docx to .rtf. Encrypt a file. ü Print a file. Save as file

(b). State two advantages for backing up files by users. (02 marks)

  • It enables the user to have multiple copies of the same work which can be sent to different people for editing e.g. A book, magazine, e.t.c.
    • It enables the user to recover work in case of data loss.
    • It enables the user to supply copies of the works to many people e.g. Software.

ü

ecolebooks.com

4

  • Study the file path given to you:

C:\Users\Budo\Desktop\Exams\SubICT-BOT,2015.docx

(a). Write down the file name from the path above. (01 mark)

  • SUBICT-BOT,2015

(b). Mention the possible application program this file was created. (01 mark)

  • Ms. Word

(c). State the immediate folder name in which the file is located. (01 mark)

  • Exams

(d). Identify the user name in the file path above. (01 mark)

  • Budo

(e). What is the importance of having file extensions in a file path. (01 mark)

  • It enables the computer to easily identify the specific application program in which to open a given file.
  • (a). Define the term data storage. (01 mark)
  • It refers to the keeping of data / information for some time in a given location.

(b). Write short notes on the following terms as used in relation to data storage.

(i). Storage capacity. (01 mark)

  • It refers to the maximum amount of data / information that a storage medium / device can hold.

(ii). Access time. (01 mark)

  • It refers to the amount of time needed to transfer data / information from one place to another e.g. from a CD ROM to Memory.

(iii). Access mode. (01 mark)

  • It refers to the method a storage medium / device uses to provide data / information to the user. It can be sequential, random, e.t.c.

5

(c). Give one factor to consider before buying a Compact Disc – ROM. (01 mark)

  • Amount of data available for storage.
    • The needs of the user.
    • The nature of data / information.
    • The destination device for play back.
    • quality of the COMPACT DISC – ROM
  • (a). State the difference between an address and a data bus. (02 marks)
  • An address bus consists of all the signals necessary to define any of the possible memory address locations within the central processing unit, while; a data bus is used to transfer instructions from memory to the CPU for execution. It carries data (operands) to and from the CPU and memory as required by instruction translation.

(b). Mention any two mathematical operators carried out by the ALU. (02 marks)

Arithmetic operatorComparison operatorComparison operatorText operatorReference operator
+==&: (colon)
>>, (comma)
*<<(space)
/>=>=
%<=)<=
^<><> , !

(c). Give one way you can improve performance of the CPU. (01 mark)

  • By increasing the amount of ram.
    • By frequently dust blowing it.
    • By installing operating system that it (the CPU) can run efficiently.
  1. (a). Define a software suite. (01 mark)
  • It refers to the collection of integrated packaged software sold as a single unit.

(b). Give two advantages of purchasing a software suite. (02 marks)

  • It is relatively cheap to buy.
    • It has similar interface features / tools.
    • Learning one package can enable the user to work with another easily.

(c). Mention two ways computer software can be obtained legally. (02 marks)

By creating own software.

6

  • By buying from authorized vendors.
    • By obtaining as an add on component e.g. hardware drivers sold in inclusion.
  1. In relation to a presentation program, what is meant by the following terms:

(a). Master layout. (01 mark)

  • It refers to the overall design / appearance of a presentation.

(b). Clip art gallery. (01 mark)

  • A tool that provides a user with a list and categorised program pictures normally called clip art that can be used for any purpose.

(c). Slide sorter view. (01 mark)

  • It refers to the display of slides at once in vertical rows, miniature or thumbnail view.

(d). Place holder. (01 mark)

  • Is a rectangular dotted object that is used to hold content in a specific region on a slide.

(e). Transition looping. (01 mark)

  • Is a presentation facility that allows all slides to move continuously or by self.
  1. Today, many people prefer buying items online. As an ICT student:

(a). Suggest a name to this type of business activity. (01 mark)

  • E-commerce.

(b). Give two advantages of using this type of trade. (02 marks)

  • Transactions can occur immediately and globally, thus save time for participants on both ends.
    • Transactions can occur 24 hours per day.
    • Businesses have access to millions of people with Internet connections.
    • Businesses have the ability to gather customer information, analyze it, and react if appropriate.
    • Information can be changed and be available quickly.
    • Customers can compare prices easily.
    • Feedback can be immediate.
    • Manufacturers can buy and sell directly, avoiding the cost of the middleman. ü Distribution costs for information is reduced or eliminated.

7

(c). Mention two other services provided by the internet. (02 marks)

  • The World Wide Web. ü Instant messaging. ü E-mail.         ü Internet telephony.
    • FTP (File Transfer Protocol).
    • Newsgroups. ü Videoconferencing.
    • Message boards.
    • Mailing lists.
    • Chat rooms.
  • You are given the following URL: https://www.kingscollegebudo.sc.ug

(a). What it the meaning of https? (02 marks)

  • It is a communication protocol for secure communication over a computer network, with especially wide deployment on the internet.

(b). Give the domain name in the URL. (01mark)

  • kingscollegebudo

(c). Suggest the possible:

Top Level Domain Name (01 mark)

  • .sc

Second Top Level Domain Name (01 mark)

  • .ug
  1. (a). Mention two ways through which computer viruses can be transmitted.

(02 marks)

  • Through sharing of computer files.
    • Through sharing of storage devices e.g. Flash disks.
    • Through sharing of computer networks / internet.
    • Through installation of already infected programs and software.
    • Opening of e-mail attachments that might be infected.
    • Booting from CD or floppy diskettes.
    • Through activities of computer crime like hacking through systems.

(b). Suggest two possible functions of an antivirus to a computer. (02 marks)

  • It scans a computer for viruses.
    • It cleans files that are infected.

It deletes files that are infected and cannot be cleaned.

8

  • It quarantines files that cannot be deleted.
    • It can be used to block certain sites, programs and resources.
    • It can be used to track stolen devices like laptops.
    • It alerts the user of the possible threat.

(c). Give one danger of computer viruses to computer hardware. (01 mark)

  • Deletes files.
    • Makes some hardware devices not available.
    • Un installs devices.
    • Leads to system failure.
    • Makes the computer take long while booting.
    • Makes the computer to frequently restart.
    • Computer can play noises.
  1. (a). In relation to a windows desktop environment, give one function of the following:

(i). Recycle bin. (01 mark)

  • Also called the trash, refers to the location where files and programs temporarily deleted from the file manager are kept.

(ii). Internet Explorer. (01 mark)

  • Is a computer program that is used to view pages on the internet.
    • Is a computer program that is used to find and open drives and files.

(iii).My Computer. (01 mark)

  • An icon that enables the used to see drives and other system properties.

(b). Give two reasons for formatting a storage medium. (02 marks)

  • To prepare a data storage device for initial use e.g. Hard disk.
    • It enable the disk to obtain a new filing system e.g. NTSF, xfat, e.t.c.
    • Needed to make a storage device visible to an operating system. ü It is also used to clean a storage device.
  1. (a). Write one function name used to evaluate the following assignments in Ms Excel:

(i). Determine the total score. (01 mark)

  • SUM

(ii). Obtaining the best done eight subjects out of the ten sat for. (01 mark)

9

  • SUM, SMALL

(iii). Determining the average score for Senior One C out of three streams.

  • AVERAGEIF

(b). Mention any two data types that can be manipulated in a spreadsheet.

  • marks)
    • Labels / text.
    • Numbers / values.
    • Formulas / functions.
    • Percentages.
    • Data and time.
  1. (a). What is a website? (02 marks)
  • It is a collection of related WebPages hyperlinked together.

(b). Write short notes on the following types of websites.

(i). Web Aggregator. (01 mark)

  • It is a type of website that collects content from other sites mainly of a particular type.

(ii). A blog. (01 mark)

  • It a type of website that is generally used to post online diaries which may include discussion forums in reverse chronological order.

(iii).Web portal. (01 mark)

  • A site that provides a starting point or a gateway to other resources on the Internet or an intranet.
  1. In relation to word processing, write short notes on the following terms:

(a). Footer. (01 mark)

  • Text that appears in the bottom margin of a page.

(b). Foot note. (01 mark)

  • Text mainly citation that automatically appear at the bottom of the page.

(c). End note (01 mark)

Text that automatically appear at the end of the document.

10

(d). Mail – Merge. (01 mark)

  • It is a facility that enables the user to manage and produce the same copy or work but with multiple addresses.

(e). Caption. (01 mark)

  • Refers to a title or short explanation appended to an article, illustration, cartoon or poster.
  1. (a). Mention two advantages of using a laptop over a desktop computer. (02 marks)
  • It is more portable that a desktop computer.
    • It has an inbuilt power backup that lacks in a desktop computer.
    • It covers a small office space.
    • It has many inbuilt facilities like webcam, keyboard, touch pad which may be bought differently for the case of desktop computers.

(b). Give two reasons for switching off a computer after use. (02 marks)

  • To avoid power wastages.
    • To reduce wear and tear for computers.

(c). In relation to a computer monitor, what is a viewing angle? (01 mark)

  • Is the maximum angle at which images on the monitor can be viewed, without excessive reduction in quality of the image
  • (a). Define the term data. (01 mark)
  • It refers to the raw facts and figures entered into a computer.

(b). Mention two ways data may be misused in an organization. (02 marks)

  • Deleting it accidently.
    • Misrepresenting it.
    • Changing it.
    • Giving it out without permission.

(c). Give two ways data accuracy can be maintained at point of entry. (02 marks)

  • Data validation.
    • Data verification.

End of set one!

SET TWO:

11

  1. (a). Define the term information processing cycle.                           (01 mark)
    1. It refers to a sequence of events in processing information, which includes input, processing, storage and output.
    1. Also a sequence of events that converts data into information

(b). Give the difference between data and information. (02 marks)

  • Data refers to meaningless, raw, un summarized facts, while, information refers to processed, summarized and meaningful data.

(c). State any two ways data may be lost in a computer laboratory. (02 marks)

  • Deleting files accidentally.
    • Viruses and damaging malware.
    • Mechanical damages of hard drive.
    • Power failures.
    • Theft of computer.
    • Spilling coffee, and other water damages.
    • Fire accidents and explosions.
    • Natural disasters.
  • (a). Write any two ways you can express =MAX(B4:B20) (02 marks)
  • =MAXA(B4:B20)
    • =LARGE(B4:B20,1)

(b). Describe how a shop keeper can use a spreadsheet program. (03 marks)

ABC
1ItemQuantityUnit price
2Sugar203,500
3Salt36500
4Soda65800
5Rwenzori982,000
6Yoghurt563,000
7Toilet paper231,000
  • (a). State two advantage of keeping work in a soft copy.                      (02 marks) ü Convenient to store.
    • Can be easily transported from one computer to another.
    • Easily edited and formatted.
    • Can be shared by many people easily say in a network.
    • Data security can easily be achieved at least costs.

Not affected much by natural disasters like humidity, e.t.c.

12


Cheaper to store.

  • Soft copies can easily be searched quickly and obtained.

(b). Mention two dangers of software piracy. (02 marks)

  • Leads to loss to software manufacturers.
  • Leads to imprisonment to offenders.
  • Leads to lack of software support from software developers. ü Leads to transmission of computer viruses.

(c). Give one way a password can be kept secure. (01 mark)

  • Use a different password for every website you visit.
  • Use a combination of upper case, lower case, numbers and symbols.
  • Change your passwords every three months.
  • If it’s hard to remember all your passwords, try a password manager.
  • Set up two-step log-ins.
  • Do not give your passwords to other people.
  • (a). Give the difference between hardware and software.                     (02 marks)
    • Hardware refers to the physical / tangible parts or components of a computer, while; Software refers to a set electronic instructions a computer needs to work.

(b). State any two branches of system software. (02 marks)

  • Operating system.
    • Programming languages.
    • Utility programs.
    • Device drivers.
    • Firmware

(c). What is a computer program? (01mark)

  • A computer program is a collection of instructions that performs a specific task when executed by a computer.
  • (a). State two advantages of using a Graphical User Interface (GUI).      (02 marks)
    • A GUI allows computer users to employ visual elements, such as desktop icons, to navigate and operate software.
    • GUIs serve as a replacement for the earlier command line interface, or CLI, approach, in which users type key terms and symbols to operate the computer.
    • You can create a more rich, and sensitive interface than is possible with CLI.
    • Most lay users will have a smaller learning time using a GUI.
    • Complex, multi-step, dependent tasks can easily be grouped together in a way that discourages mistakes.
    • Ability to embed media

ü

13

(b). Briefly, explain the following as used in word processing.

(i). Red wave underline below a word. (01 mark)

  • Wrong spelling of word.
  • Repetition of a word

(ii). Green wave underline below a sentence. (01 mark)

  • Grammatical error.
  • Word order error.

(iii). Auto – complete. (01 mark)

  • Auto complete, or word completion, is a feature in which an application predicts the rest of a word a user is typing.

6. (a). Mention any one device that can be used to enter data into a computer.

(02 marks)

Mouse. ü Web cam. Keyboard. ü Touch pad. Tracker ball. ü Stylus pen. Microphone. ü Light pen. Remote control. ü QR code reader. Scanner. ü Bar code reader. MICR reader. ü Touch screen. OCR reader.
(b). Give two requirements for conducting a live video conference. Web cam. Head set. Computer / device e.g. mobile phone. Internet connectivity. Video conferencing software.(02 marks)

(c). State two uses of ICT in your school. (01 mark)

  • Computerbased training, which includes
  • Computer-assisted instructions (CAI), so that teachers can use computers and other IT equipment to present teaching materials in a more interesting way.
  • Computer-assisted learning (CAL), so that students can use computers and appropriate software to learn at their own pace.
  • Computer-assisted assessment (CAA), which may reduce the time and labor to mark the answer scripts.
  • Distance learning through computer-based training and Web-based training.
  • Simulations of experiments or real-life situations that may be hazardous.
  • Electronic library system for searching, borrowing, and returning books.
  • The School Administration and Management System (SAMS) for keeping records of students and producing report cards or other related documents.

14

Edutainment, which is a type of educational software that combines education with entertainment.

  • (a). What is a transition loop?                                                               (01 mark)
    • Is a feature in a presentation program that allows the slide to move either continuously or repeatedly or to the final slide depending on the user defined the settings.

(b). Suggest any two features of a good looking presentation. (02 marks)

  • Use of clear fonts.
    • Each slide should have a heading.
    • Use of appropriate colours and fonts.
    • Use minimal animations.
    • Use few but relevant graphics / images.
    • Should address needs of the user.

(c). Give two uses of a slide sorter facility. (02 marks)

  • Slide Sorter view gives you a view of your slides in thumbnail form.  
    • This view makes it easy for you to sort and organize the sequence of your slides as you create your presentation, and then also as you prepare your presentation for printing.
    • You can add sections in Slide Sorter view as well, and sort slides into different categories or sections.
  • (a). Give two factors to consider before buying a printer. (02 marks)
Printing speed Print quality Supported operating systems Ease of use Flexible paper handling Interface connections Energy savingsEconomical printing Supplies management Accessibility of the printer and other accessories. Security of the printer ü

(b). What is a printer driver? (01 mark)

  • Is a computer program that is used to configure or attach a printer in order to work with a computer.

(c). Outline two reasons for scrolling a page / document. (02 marks)

  • When one wants to see hidden work in a document.
    • When one wants to zoom in or out of a document.
    • When one wants to go through a program menu list. ü When one wants to see all the pages in a document.

ü

  • (a). State any one component found in a title bar. (01 mark) ü Maximize /Restore button. ü Minimize / collapse button.

15


Close / exit button

(b). Give two crimes committed through use of e-mails. (02 marks)

  • Fraud. ü Hacking into e-mail accounts.
  • Malice. ü Eavesdropping.
  • Sabotage. ü Cracking.
  • Spamming. ü Software piracy.
  • Identity theft. ü Intellectual
  • property infringement.

(c). My e-mail address is [email protected]. Identify:

(i). E-mail separator. (01 mark) ü @

(ii). Domain name. (01 mark)

  • gmail
  1. Write down an application example for carrying out each of the following tasks.

(05 marks)

(a). Typeset a letter to invite the Guest of Honour Ms. Word, Abi Word, Word Pro, e.t.c

(b). Draw a budget for Senor Six ICT club 2016 Ms. Excel, Sheetstar, e.t.c

(c). Send an e-mail to a classmate Outlook, e.t.c.

(d). Prepare a talk to the senior ones in your school Ms. PowerPoint e.t.c.

(e). Search for information from the internet Google search engine, Bing search engine, e.t.c.

  1. Explain the following mouse techniques:

(a). Click. (01 mark)

  • Refers to pressing either of the mouse buttons once.

(b). Double click. (01 mark)

  • Refers to pressing a left button in a quick double succession. It is normally used to open an application, execute a program, e.t.c.

(c). Scroll. (01 mark)

16

Refers to moving a page either direction in order to see hidden work, zoom in or out, e.t.c.

(d). Drag. (01 mark)

  • Move to new location

(e). Drop. (01 mark)

  • Refers to releasing an object that has been dragged.

12. (a). Under what circumstance may a user opt for a compact disk for data storage?

(02 marks)

  • When one wants to keep a copy permanently.
  • When one wants to keep a portable copy of the work.
  • When one wants to keep a lot of work in one location.
  • When one wants to keep data for distribution e.g. software, e.t.c.

(b). Give one reason for storing a document in a pdf format. (01 mark)

  • PDF documents can be quickly and easily created
  • It ensures required security without compromising originality.
  • It has the ability to compact and able to compress large files.
  • It has the ability to exist independently from the hardware, software and operating system (OS) used to create or view the PDF document.
  • Less chance of information being lost, destroyed or being accessed inappropriately.
  • Records are managed throughout their lifetime.

(c). Many people today prefer buying goods online. State two advantages of using

this practice. (02 marks)

  • It is extremely convenient while carrying out transactions.
  • It is time saving.
  • Without driving from store to store the consumer can easily compare and contrast products.
  • When products are placed online, they come with all the specifics, and they want you to compare them with others, know they have the best options and come back for more.
  • Because the competition is high, companies online want you to look at other consumer reviews.
  • Increasing customer base.
  • Rise in sales.
  • it is open for consumers 24/7 every day of the year. The doors never close and profits will keep rising.
  • With the right marketing, every consumer around the globe can find the business site, products and information without leaving home.

17

ü Instant transactions.

  1. (a). Distinguish a webpage from a website.                                           (01 mark)
    1. A webpage is a single page in a website, while a website is a collection of several WebPages.

(b). Describe the following types of websites:

(i). Blog. (01 mark)

  • A blog (also called a weblog or web log) is a website consisting of entries (also called posts) appearing in reverse chronological order with the most recent entry appearing first (similar in format to a daily journal).

(ii). Wiki. (01 mark)

  • Is a website which allows collaborative modification of its content and structure directly from the web browser.

(iii). Rating site. (01 mark)

  • A rating site (less commonly, a rate-me site) is a website designed for users to vote on or rate people, content, or other things.

(iv) Portal. (01 mark)

  • A web portal is most often one specially designed web site that brings information together from diverse sources in a uniform way.
  1. (a). Under what circumstances may a user carry out the following activities?

(i). Software updating. (01 mark)

  • When one wants to increase, modify or add software functionality of the same version.

(ii). Computer restarting. (01 mark)

  • Commonly used to recover from errors that cannot be recovered.
    • When a computer locks or freezes.
    • After installing of certain new software program.
    • After installing a new hardware device like a flash disk.
    • After uninstalling a hardware device.
    • After uninstalling a software program.
    • When the computer slows down.
    • After changing CMOS or BIOS setup.
    • When a computer has a virus, it can restart itself.

18


(b). Muwanguzi carried out a fresh installation of his laptop and later, he realized that some of the devices could not function.

State two possible causes of this occurrence (02 marks)

  • He had not yet installed device drivers.
  • Maybe there was device incompatibility.

(c). Define an off – the – shelf software. (01 mark)

  • Refers to application programs already made for use to solve a variety of tasks.

15. (a). Outline any two functions of an operating system. (02 marks)

Provides basic working environment/interface on a computer. ü Controlling the use of peripherals. Controlling the loading and running of application programs. ü Organizing the use of memory/Memory management ü It helps in the booting process of a computer. It helps in file management It helps in protecting hardware and software. It helps in the process of connecting devices to work with a computer (configuring devices) It helps in the processor management e.g. multitasking and time sharing.

(b). Distinguish between a freeware and a shareware. (02 marks)

  • Freeware refers copyrighted software provided at no cost, While; Shareware refers to copyrighted software provided on a trial basis but later the user has to pay to use of all the functions provided.

(c). State one factor to consider before buying a software program. (01 mark)

  • Compatibility issue with the hardware.
  • Compatibility with the available software.
  • Needs of the organisation.
  • Is the product an up-to-date, current version or release?
  • Ease of use of the software/User friendly
  • Whether the manufacturer offers technical assistance of users of the programs.
  • Nature of the software manufacturer.
  • Efficiency and productivity of the program.
  • Whether the software vendor offers service support centre for routing updates.
  • Cost of the program to use.

19

  1. (a). Briefly, explain when the following functions can be used:

(i). IF. (01 mark)

  • The IF function in Excel returns one value if a condition is true and another value if it’s false.

(ii). COUNTIF (01 mark)

  • The COUNTIF function in Excel counts the number of cells that meet criteria you specify.

(b) How many cells are in the rangeB10:G14? (01 mark)

  • 30 cells

(c). State any two qualities of a good graph. (02 marks)

It should have a good descriptive title. Should have right data selection. Should be the right chart type.
  1. (a). State one practical use of the following keyboard keys.

(a). Enter. (01 mark)

  • Is used to send the cursor to the next line or execute a command or operation.

(b). Caps Lock. (01 mark)

Computer keyboard toggle key that enables or disables all the letters from being typed in uppercase. It changes or gives room for activation of small letters (lower case) to capital letters (UPPER CASE) and from capital letters to small letters.
(c). Num lock.(01 mark)
ü It activates or deactivates the numerical pad on the keyboard.

(d). Space bar. (01 mark)

  • It provides necessary gaps between words in a sentence.

(e). Control key. (01 mark)

  • Is a modifier key which, when pressed in conjunction with another key, performs a special operation (for example, Ctrl + C ); similar to the Shift key, the Control key rarely performs any function when pressed by itself.

20

  1. (a). Give two advantages of real – time data processing. (02 marks)
There is no significant delay for response. Information is always up-to-date. Output from the computer may be used to adjust and improve the input.

(b). State any two parts that make up a CPU. (02 marks)

  • ALU.
    • Control unit.
    • Registers.

(c). Mention one component that can be replaced or upgraded to improve the

general performance of the CPU. (01 mark)

RAM. Video cards. Hard disk drive.
  1. (a). List two advantages of LCD over CRT monitors.                           (02 marks)
    1. LCD monitors require less than one-third the power of a CRT.
    1. LCD monitors take up less desk space than traditional CRT monitors.
    1. Radiation emitted by LCD monitors is neglectable than that of CRTs.
    1. They have a narrow viewing angle compared to CRT monitors.
    1. They have a higher refresh rate compared to CRT monitors.
    1. They have a higher and colour rich resolution than CRTs.

(b). State two factors to consider before buying a monitor. (02 marks)

  • Size
    • Resolution
    • Aspect Ratio ü Backlighting
    • Twisted nematic (TN) or In-plane switching (IPS)
    • Video input
    • Ergonomic flexibility
    • Needs of the organisation.

(c). While servicing a computer, state one use of the following:

(i). Screw driver. (01 mark)

21

  • To lock or open screws in hardware devices.

(ii). Wrist anti-static chain. (01 mark)

20. Use the following application tools to fill in spaces below:

Format Painter, Highlight, Water Mark, Footer, Footnote, Gallery, Insert, Centre,

Justify. (05 marks)

(a).Footnote inserts a citation, narration, reference in a specific page.

(b). Using the justify tool, text is distributed evenly in a page.

(c). Highlight allows a user to emphasize text in a document.

(d). Word art collections can be obtained from gallery location.

(e).Format Painter allows a user to copy a given pattern appearance to another piece of text in a document.

End of set two!

22

SET THREE:

1. a) Give the difference between data and information. (01 mark)

  • Data is a collection of unprocessed raw facts entered into computer, while; information is processed data.

(b). State two ways data can be kept safe in a computer laboratory. (02 marks)

  • By using passwords.
  • Through activating firewalls.
  • By frequently backing up data.
  • Through having a thorough audit trail.
  • By installing antivirus programs to guard against data loss.
  • By use of biometric devices to allow access to the computer.
  • By sensitizing users.
  • By enforcing a data protection policy for an organization.

(c). Mention two devices used to enter text into a computer. (02 marks)

Keyboard. Mouse. Touch screen. Tracker ball. Scanner. MICR readers.Bar code readers. OCR readers. Microphone through recognition. Through use of Dictaphonesvoice

2. (a). State two ways of ensuring continuous use of a computer. (02 marks) ü By regularly servicing the computer.

  • By upgrading computer software.
  • By updating computer software.
  • By covering a computer to avoid dust from entering a computer.
  • By use of air conditioner facility.
  • By training workers into better methods of using the computer facilities.
  • By writing an ICT policy that guides the use of computer facilities.
  • By employing trained personnel to help in areas of computer use difficulties.
  • Install an antivirus program to reduce damage caused by viruses onto hardware.
  • By implementing physical access guidelines to users.
  • Penalize users who intend to vandalize computers.

(b). Give two advantages of air conditioning in a computer laboratory. (02 marks)

  • To reduce dust in a computer lab.
  • To cool the room so that it is comfortable and conducive to sit in. ü To prevent insects from entering a computer laboratory.

23

(c). Write PC in full. (01 mark)

ü Personal Computer

3. (a). Mention two devices that can be used both as input and output devices. (02 marks) ü Touch screen.

  • Smart board.
  • Galaxy, android and smart phones.
  • Digital camera

(b). State two disadvantages of dot-matrix printers over laser-jet printers. (02 mks)

  • They are very slow at printing work.
  • They produce a lot of noise.
  • They produce poor quality output.
  • They are expensive to use in the long – run.

(c). Mention one area where light emitting diodes are used. (01 mark)

  • To report errors in a device driver e.g. paper jam.
  • Indicate availability of a device e.g. device ready, idle, e.t.c. ü Indicates activity hardware is carrying out.

4. (a). Write CPU in full. (01 mark)

  • Central Processing Unit

(b). State the difference between registers and buffers. (02 marks)

  • Registers are high-speed temporary storage locations used to hold data and instructions, while; buffers are used temporarily to store output or input data.

(c). Mention two functions of the ALU in a processor. (02 marks)

  • The ALU performs the arithmetic,
  • Carries out logical operations that include working with conditions like AND, OR, IF, NOT, e.t.c.

5. (a). State one function of the following:

(i). Caps lock (01 mark)

  • It causes the keyboard to go into a mode in which letter keys are interpreted as capital letters by default

(ii). Esc key (01 mark)

  • It is used to cancel an activity or operation.
  • It is used to stop or pause a presentation.
  • It is used to go back to the menu platform in games.

24

  • It is used to go the start menu in a windows computer (Ctrl + Esc)
  • Switch to InDesign’s selection tool from within a text box
  • Reverse your “make this tab a window” drag
  • Hide your browser cursor
  • Erase and get out of the Spotlight menu
  • Take a shortcut back to your original application

(b). Give one difference between a backspace and delete key. (02 marks)

  • Backspace deletes a character to the left of the cursor, while; delete key erases a character to the right of the cuprsor.
(c). State one use of a computer keyboard in data processing. Used to enter text into a computer. Used select data. Used to enter an instruction during data processing. ü Used to align objects during data processing. 6. (a). Write short notes on the following:(01 mark)
(i). Character map. ü It is used to enter special characters that do not appear on a keyboard.(01 mark)
(ii). Footer ü Text that appears in the bottom margin of the page repeatedly.(01 mark)
(iii). Backup ü Involves making multiple copies of a piece of data. (b). State two circumstances under which the following are done.(01 mark)
(i). Save ü Involves storing a file for the first time or a new document.(01 mark)
(ii). Save as ü Means to store an existing file by giving it another file name. 7. Using the following file path to answer questions below: C:\Users\Student\Desktop\functionalcomputing.docx(01 mark
(a). In which storage device was the file stored? ü Hard disk.(01 mark)

25

(b). In which program was the file saved? (01 mark)

  • In a word processing application.

(c). In which account privilege was the file stored? (01 mark) ü User

(d). State two features of the program used to store this work. (02 marks)

  • Word-wrap– Allows a user to type continually without pressing the Enter key at the end of each line.
  • Find and search – Allows a user to locate all occurrences of a particular character, word, or phrase.
  • Replace – Allows a user to substitute existing characters, words, or phrases with new ones.
  • Spelling checker – Allows a user to check the spelling of a whole document at one time, or to check and even correct the spelling of individual words as they are typed (i.e., AutoCorrect).
  • Grammar checker – Reports grammatical errors and suggests ways to correct them.
  • Thesaurus – Suggests alternative words with same meaning (i.e., synonyms) for use in the document.
  • Mail merge – Create form letters, mailing labels, and envelopes.
  • Automatic page numbering – Numbers the pages automatically in a document.
  • Tables – Allows a user to organize information into rows and columns.
  • Multi-columns – Arranges text in two or more columns that look similar to a newspaper or magazine.
  • Macros – Allows a user to record or save frequently used keystrokes and instructions, which can be executed later by running the corresponding macros.
  • Clip art gallery – Allows a user to insert drawings, diagrams, and photographs into a document.
  • Mathematical formulae typesetting – Allows a user to typeset complex mathematical formulae within the program.

8. (a). Write the term e-mail in full. (01 mark)

  • E-mail is electronic mail, is the transmission of messages via a computer network such as a local area network or the Internet.

(b). Give two advantages of using an e-mail in data communication. (02 marks)

  • Very quick and cheap delivery.
  • Computer files can be attached to an email.
  • Records and copies is kept automatically.
  • Can be picked up anywhere in the world.
  • Can be sent at any time to suit the sender.

(c). In relation to an e-mail, give the meaning of the following abbreviations:

26

(i). BCC (01 mark)

  • Blind Carbon Copy

(ii). CC (01 mark)

  • Carbon Copy

9. (a). State the difference between primary key and foreign key as used in Ms

Access. (01 mark)

  • A primary key is used to uniquely identify a record in a table, while; a foreign key is used in one table to represent the value of a primary key in a related table.

(b). State two data checks used in Ms Access. (02 marks)

  • Validation checks used in a database
  • Allowed character checks: checks that ascertain that only expected characters are present in a field.
  • Batch totals: Checks for missing records. Numerical fields may be added together for all records in a batch. The batch total is entered and the computer checks that the total is correct.
  • Check digits: The computer checks this calculation when data are entered.
  • Consistency checks: Checks fields to ensure data in these fields corresponds, e.g., If Title = “Mr.”, then Gender = “M”.
  • Control totals: This is a total done on one or more numeric fields which appears in every record.
  • Cross-system consistency checks: Compares data in different systems to ensure it is consistent, e.g., the address for the customer with the same id is the same in both systems.
  • Data type checks: Checks the data type of the input and give an error message if the input data does not match with the chosen data type, e.g., In an input box accepting numeric data, if the letter ‘O’ was typed instead of the number zero, an error message would appear.
  • File existence check: Checks that a file with a specified name exists. This check is essential for programs that use file handling.
  • Format or picture check: Checks that the data is in a specified format (template), e.g., dates have to be in the format DD/MM/YYYY.

27


Hash totals: This is just a batch total done on one or more numeric fields which appears in every record. This is a meaningless total, e.g., add the Telephone Numbers together for a number of Customers.

  • Limit check: Unlike range checks, data is checked for one limit only, upper OR lower,

e.g., data should not be greater than 2 (<=2).

  • Logic check: Checks that an input does not yield a logical error, e.g., an input value should not be 0 when there will be a number that divides it somewhere in a program.
  • Presence check: Checks that important data are actually present and have not been missed out, e.g., customers may be required to have their telephone numbers listed.
  • Range check: Checks that the data lie within a specified range of values, e.g., the month of a person’s date of birth should lie between 1 and 12.

(c). Give two advantages of using a primary key in Ms. Access (02 marks)

  • It uniquely identifies each row.
  • It is never empty or null — there is always a value.
  • It rarely (ideally never) changes.
  • Access uses primary key fields to quickly bring together data from multiple tables through table relationships.

ü

10. Use the following spreadsheet chart to answer questions below:

ABCD
1ItemQuantityUnit costTotal cost
2Bread40Ugx. 3,800
3Cake60Ugx. 500
4Fanta50Ugx. 800
5Rolex30Ugx. 1,200
6Sorghum10Ugx. 800

(a). Write the data type used in the range B2:B6? (01 mark) ü Number

(b). What custom format was used to generate output in cell range C2:C6?

(01 mark)

ü “Ugx.” #,###

28

(c). How many cells are in the range A2:C6? (01 mark)

  • 15 cells

(d). State two ways data in cell range A1:D1 can be emphasized? (02 marks) ü By bolding.

  • By underlining.
  • By changing font size.
  • By changing font colour.
  • By changing text direction.
  • By changing text alignment.

11. You are provided with the following figure prepared using a word processor.

NAMEENGLISHS.S.TMATHSSCIENCETOTAL
Mwase D.701002070
Swabulin M.60406070
Kintu S.70202081
Wandalo D.70601081
Nalweyiso A.70701590

(a). State the formula for determining total score for Wandalo D. (01 mark)

  • =sum(left)

(b). State one word processing feature used to prepare the figure above. (01 mark) ü It is a table.

(c). When you arrange the total in descending order, write down the order

for all the students. (02 marks)

  • Wandalo D, Swabulin M., Nalweyiso A., Mwase D., Kintu S.

(d). When you sort Maths results in ascending order, write down the correct

order of marks. (01 mark)

29

10, 15, 20, 20, 60

12. (a). Define the term internet browser. (01 mark)

  • A Web browser is a software program used to access and view Web pages.

(b). State two examples of browsers a user can manipulate. (02 marks)

360 Secure Browser Abaco (for Plan 9 from Bell Labs) Alynx Google Chrome Internet Explorer Mosaic-CK Mozilla fire fox Mozilla Navigator MSN Explorer (discontinued)Netscape Navigator and Netscape Communicator Opera (for releases up until 12.14[21]) Opera (not yet, but announced [21]) Opera Mini Opera web browser Safari

(c). Write short notes on the following:

(i). Search engine. (01 mark)

  • Is a software program that can be used to find Web sites, Web pages, and files on the Internet.

(ii). Wiki (01 mark)

  • A site which users collaboratively edit its content.

13. (a). Define the term data communication. (01 mark)

  • Refers to one computer transferring data, instructions, and information to another computer or some other computers.

(b). State two elements of a data communication channel. (02 marks)

  • Simplex channel
  • Half duplex channel
  • Full duplex channel
  • Multiplex channel

(c). Mention two areas where GPS is currently being used in business. (02 marks)

  • To locate a person or an object in business.
  • Ascertain the best route between two points ü Monitor the movement of a person or object.
  • Create a map
  • Many cars and ships also use GPS to provide directions to a destination and weather

30

information.

14. (a). Distinguish between a freeware and a shareware. (01 mark)

  • Freeware is copyrighted software provided at no cost to users, while; Shareware is copyrighted software that is distributed free for a trial period, and payment is required for using the software beyond that trial period.

(b). State two uses of an operating system to a computer. (02 marks)

  • Provides basic working environment/interface on a computer. ü Controlling the use of peripherals.
  • Controlling the loading and running of application programs. ü Organizing the use of memory/Memory management ü It helps in the booting process of a computer.
  • It helps in file management
  • It helps in protecting hardware and software.
  • It helps in the process of connecting devices to work with a computer (configuring devices)
  • It helps in the processor management e.g. multitasking and time sharing.

(c). Mention two examples of software suite. (02 marks)

  • Ability Office
  • Apache OpenOffice (formerly known as OpenOffice.org)
  • Aster*x
  • AUIS — an office suite developed by Carnegie Mellon University and named after Andrew Carnegie.
  • Breadbox Ensemble runs under the GEOS (16-bit operating system) and effectively requires a version of DOS to be installed on the host system.
  • Breadbox Office — DOS software, but has been successfully tested with Win3.x, Win95/98/98SE/ME, WinNT4.0, Win2000 and the 32bit-versions of WinXP, WinVista and Win7.0.
  • Calligra Suite is the continuation of KOffice under a new name. It is part of the KDE Software Compilation.
  • Celframe Office — supports Microsoft Office and other popular file formats, with a user interface styled on Microsoft Office 2003.
  • ContactOffice – an AJAX-based online office suite. The suite includes personal and shared Calendar, Document, Messaging, Contact, Wiki,… tools. Available free and as an enterprise service.
  • Corel WordPerfect for DOS – A word processor, spreadsheet, and presentation software from Corel (containing WordPerfect 6.2, Quattro Pro 5.6, Presentations 2.1, and Shell 4.0c).
  • Documents To Go (Android and others)
  • EasyOffice

31

Kingsoft Office (Chinese version known as WPS Office) — Available as a paid Professional edition, with a less capable freeware version as another option. (for Windows or Android only)

  • Microsoft Office
  • Microsoft Works
  • Mobile office suites
  • MobiSystems OfficeSuite Pro
  • Office suites for Android, BlackBerry, iPhone, Symbian, Windows Mobile, Windows Phone, and others.
  • QuickOffice, QuickOffice HD Pro (iOS and others)
  • ShareOffice — a Web-based office suite from ShareMethods. This suite utilizes separate word processing, spreadsheet, and presentation applications from other vendors. It is distributed through Salesforce.com’s AppExchange program.
  • Windows Live Office – an online office suite from Microsoft which is based on Windows Live SkyDrive. It includes a word processor, a spreadsheet, a presentation application and a notetaking program. Allow users to create, edit, save and share documents. ü WordPerfect Office

15. (a). State one example of a device that is:

(i). Magnetic (01 mark)

  • Magnetic tapes.
  • Hard discs.
  • Magnetic stripes.
  • Floopy diskettes.
  • Zip discs.

ü

(ii). Solid-state (01 mark)

  • Flash discs. ü SSD cards
  • Memory cards

(iii). Optical. (01 mark)

  • DVD – ROM
  • CD – ROM
  • Blue –ray discs

(b). State two ways of ensuring data security on the devices mentioned above.

(02 marks)

  • Not keeping heavy objects onto them.

32

  • By avoiding bending and scratching on the disk side of the disk surface.
  • By right protecting of devices to avoid accidental erasers.
  • By installing latest copy of antivirus programs.
  • By sensitizing users.
  • By writing and emphasizing the data protection act for organizations.
  • By keeping them away from dust and smoke.
  • By ejecting them after properly stopping them. ü By defragmenting discs for example hard disc.
  • By keeping them in protective jackets to avoid scrathes.

16. (a). State two ways IT is used at your school. (02 marks) ü Computer-based training, which includes:

  • Computer-Assisted Instructions (CAI), so that teachers can use computers and other IT equipment to present teaching materials in a more interesting way.
  • Computer-Assisted Learning (CAL), so that students can use computers and appropriate software to learn at their own pace.
  • Computer-Assisted Assessment (CAA), which may reduce the time and labor to mark the answer scripts.
  • Distance learning through computer-based training and Web-based training.
  • Simulations of experiments or real-life situations that may be hazardous.
  • Electronic library system for searching, borrowing, and returning books.
  • The School Administration and Management System (SAMS) for keeping records of students and producing report cards or other related documents.

(b). State two disadvantages of using IT in society. (02 marks)

  • Leads to moral degeneration.
  • Leads to computer crime.
  • Leads to laziness.
  • Leads to loss of man hour.
  • Leads to accidents through explosions and electric shocks.
  • Leads to long time side effects and health hazards like sight defects.
  • Leads to unemployment as computers replace man at a workplace. ü Leads to digital divide.

(c). What is the meaning of the term ICT. (01 mark)

33

ICT is concerned with the storage, retrieval, manipulation, transmission or receipt of digital data. Importantly, it is also concerned with the way these different uses can work with each other.

17. (a). What is meant by Computer Aided Design? (01 mark)

  • Is the use of computer systems to assist in the creation, modification, analysis, or optimization of a design.

(b). Give two different applications where CAD is used. (02 marks)

  • Computer-aided engineering (CAE) and Finite element analysis (FEA)
  • Computer-aided manufacturing (CAM) including instructions to Computer Numerical Control (CNC) machines
  • Photo realistic rendering.
  • Document management and revision control using Product Data Management (PDM).
  • CAD is also used for the accurate creation of photo simulations The features in the CAD system can be used for the variety of tools for measurement such as tensile strength, yield strength, also its stress and strain and how the element gets affected in certain temperatures.

ü

(c). Mention any two specialized devices used in CAD. (02 marks)

  • Track ball.
  • Mouse.
  • Keyboard.
  • 3D devices.
  • Printer.
  • Graphics plotters.

18. (a). Name two pieces of hardware needed to enable video-conferencing to

take place using a standard computer system. (02 marks)

  • Microphone
  • Speaker
  • Web cam

ü

(b). State one piece of specialist software needed to carry out Video – conferencing.

  • Skype
  • Lenovo you cam.

(c). State two advantages of using video – conferencing over instant messaging.

(02 marks)

34


Communication involves users seeing their pictures on either machine.

  • It allows for voice call communications.
  • Recordings can be used for future reference.

19. (a). Define the following terms:

(i). Record (01 mark)

  • A record is a row in a table that contains information about a given person, product, or event.

(ii). Field (01 mark)

  • A field is a column in a table that contains a specific piece of information within a record.

(b). State two advantages of using an electronic database over a manual

database. (02 marks)

  • It is easy to enter and retrieve data in a short period of time.
  • A database stores data that is consistent and reliable since at each stage, it is checked for consistency and reliability.
  • A database can store data for a very long period of time say 20 years and so in an archive.
  • A database is flexible since it can be redesigned, to hold thousands of data.
  • A database can be used by many people at the same time.
  • Data is frequently updated after each single entry.
  • Data is automatically saved as soon as data is entered into a database.
  • Data can be retrieved in different formats e.g query, forms, reports, e.t.c.

(c). Define the term validation rule. (01 mark)

  • Is a method used to check that data falls within the appropriate range or parameter defined by the database user.

20. (a). In a practical sense, state the meaning of the following:

(i). Clicking (01 mark)

ü Clicking is most commonly used with a computer mouse when the pointer is placed over an icon or object and the button pressed once.

(ii). Double click (01 mark)

35

Double clicking is most commonly used with a computer mouse when the pointer is placed over an icon or object and the button is quickly pressed twice. This action, when performed without moving the location of the mouse, will produce a double click.

(iii). Drag (01 mark)

(b). Mention two uses of a mouse in data processing. (02 marks)

  • To select a document.
  • To play a computer game.
  • To control movement of the cursor.
  • To input text.
  • To draw objects.

End of set three!

36

SET FOUR:

  1. (a). State the difference between data and information. (02 marks)
    1. Data refers to the raw facts entered into a computer, while; Information refers to processed data.

(b). Mention any two devices that can be used to transfer data from one laptop

to another. (02 marks)

External hard disk. Flash disk. Memory cards. Compact disk. Digital versatile disk.Blu-ray discs. Magnetic tapes. Floppy diskettes. Blue tooth.

(c). Give one characteristic of a good computer. (01 mark)

  • Speed.
    • Accuracy.
    • Storage.
    • Diligence.
    • Artificial intelligence.
    • Automation.
    • Versatility.
  • (a). What is computer literacy.                                                      (01 mark)
    • Computer literacy refers to having knowledge and understanding of computers and their uses

(b). State two ways a SUB ICT student can promote computer literacy in our

society. (02 marks)

  • Through undertaking computer training courses.
    • Through attending workshops.
    • Through practical hands on.
    • Through reading computer related literature.
    • Through carrying out research.
    • By use of the internet where resourceful tutorials can be downloaded for use.

(c). Give two limitations to computer literacy in our community. (02 marks)

  • Computer phobia – people fear to use computers.
    • Myths about using a computer e.g. You will kill your sight.
    • Expensive hardware and software components. ü Restricted to well to do people.
    • Some places lack connection to the power grid.

37


  • (a). State two possible ways of booting a computer.   (02 marks) ü Cold booting.
    • Warm booting.

(b). What is the importance of RAM in the booting process. (01 mark)

  • RAM provides the primary storage location where the main program in the operating system in stored for execution.

(c). Define the following terms as used in relation to the Windows environment.

(i). Log off. (01 mark)

  • Log off or log out is a term used to describe the process of disconnecting from a network, user account or what occurs when your connection is lost.

(ii). Hibernation. (01 mark)

  • Hibernation is the process of powering down a computer while retaining its state.
  • Study the file path given below and answer questions following:

C:\KCB-01\PCM\Desktop\Senior Six\EOTP1.docx

Identify the following parts:

(a).Root directory: C:\ (01 mark)
(b).Computer Name: KCB-01 (01 mark)
(c).File extension. .docx (01 mark)
(d).Folder location. Desktop (01 mark)
(e).Account Name. PCM (01 mark)
  • Use the following words to fill in the spaces below: (05 marks)

Footer, Footnote, Endnote, Watermark, Caption, Drop cap, Mail-Merge

(A). Mail – merge
(b).Caption.
(c).Footnote.
(d).Watermark
(e).Drop cap

38

  • (a).  Define the term software piracy.                                                    (01 mark)
    • It refers to the illegal/unauthorized copying, distribution and use of software.

(b). Give two dangers of software piracy to the user. (02 marks)

  • Leads to loss of income.
    • Can lead to imprisonment of the offender.
    • Leads to spread of computer viruses.
    • Does not allow getting support from the software developer or service centre.

(c). Mention two ways software piracy can be controlled in our society.(02 marks)

  • Copy protection system.
    • Separate demo and full version.
    • Online game features or online registration.
    • Give discounts or lower the product price. ü Give your product for free.
    • Don’t give away your software source code. ü Legal action.
    • Enforce copy rights.
  • (a). Distinguish between soft copy and hard copy.                                  (01 mark)
    • A soft copy is an electronic copy of some type of data, such as a file viewed on a computer’s display or transmitted as an e-mail attachment, while, a hard copy is a permanent reproduction, or copy, in the form of a physical object, of any media suitable for direct use by a person (in particular paper), of displayed or transmitted data.

(b). Mention two advantages of keeping data in a soft over hard copy.(02 marks)

  • It eliminates the use of paper and ink.
    • It makes editing and formatting simple.
    • It stores a lot of data.
    • It can be sent over a network to several people.

ü

(c). State two activities that can be carried out on a file. (02 marks)

  • Editing.       ü Saving.
    • Copying. ü Formatting.
    • Opening. ü Merging files.
    • Printing. ü Compressing a file.
  • (a). Explain how a shop-keeper can use a spreadsheet application. (03 marks)
ABCD
1Item nameQuantityUnit priceGross Sales
2Soda20800
3Doughnut50250

39

4Pancake56200
5Water32250
6Milk12800
7Yoghurt45250

(c). Mention any two data types entered into a spreadsheet program.(02 marks)

Text. Number. Formula. Percentage.Date / time Currency ü
  • (a). Give two advantages of using an e-mail over ordinary mail for communication.

(02 marks)

  • Emails are delivered extremely fast when compared to traditional post.
    • Emails can be sent 24 hours a day, 365 days a year.
    • Web mail means emails can be sent and received from any computer, anywhere in the world, that has an Internet connection.
    • Cheap – when using broadband, each email sent is effectively free. Dial-up users are charged at local call rates but it only takes a few seconds (for conventional email, eg text only) to send an email.
    • Emails can be sent to one person or several people.
    • Computer files can be attached to an email. ü Records and copies are kept automatically.

ü

(b). State the difference between sign in and sign up as regard to an e-mail software.

(02 marks)

  • Sign in refers to the process of using certain details to obtain access to a computer system or other restricted area, while sign up supplies the necessary information so as to open an account with an e-mail software.

(c). Mention one computer crime related to use of e-mails today. (01 mark)

Spamming. Money laundering. Trespass. Identity theft. Spoofing.IP hijacking. Fraud. Distribution of offensive content. Distribution of pornographic content.
  1. (a). Define the term data communication.                                             (01 mark)
    1. Data communications refer to one computer transferring data, instructions, and information to another computer or some other computers.

ü

(b). Mention two components of a data communication model. (02 marks)

  • Sending device.       ü Communicating device.
    • Receiving device. ü Communication software.

40

  • Communication channel.

(c). Briefly, explain the following data communication tools:

(i). Blog. (01 mark)

  • Is a discussion or informational site published on the World Wide Web and consisting of discrete entries (“posts”) typically displayed in reverse order (the most recent post appears first).

(ii). Instant messaging. (01 mark)

  • Is a real-time communications service that notifies a user when one or more people are online and then allows the user to exchange messages or files with them.

11. (a). Give the difference between the internet and World Wide Web. (01 mark)

  • Internet refers to a global interconnection of computer networks, while, Word Wide Web refers to a collection of several web pages linked together

(b). Suggest two ways the internet can be used to improve teaching and

instruction in your school. (02 marks)

  • Computer-based training.
  • Distance learning through computer-based training and Web-based training.
  • Simulations of experiments or real-life situations that may be hazardous.
  • Electronic library system for searching, borrowing, and returning books.
  • The School Administration and Management System (SAMS) for keeping records of students and producing report cards or other related documents.
  • Edutainment, which is a type of educational software that combines education with entertainment.

(c). Define the following web based tools:

(i). Search engine. (01 mark)

  • A search engine is a software program that can be used to find Web sites, Web pages, and files on the Internet.

(ii). E-library. (01 mark)

  • An electronic library (also referred to as digital library or digital repository) is a focused collection of digital objects that can include text, visual material, audio material, video material, stored as electronic media formats (as opposed to print, micro form, or other media), along with means for organizing, storing, and retrieving the files and media contained in the library collection.

41

12. (a). Mention two advantages of using a custom – tailored software over an off shelf application. (02 marks)

  • It is specifically designed for a particular requirement and can be tailored to fit in exactly with the way the business or organization wishes to operate.
  • It can be customised to work with other software that operate with the potential to provide a fully integrated IT infrastructure across the whole organisation
  • Users usually find it easier and more interesting to use as it does not contain unnecessary or redundant facilities.
  • It is much more flexible than packaged software and can be modified and changed over time requirements and business practices change
  • The user receives much better support and can in many cases talk directly to the developers concerned.
  • If you are lucky and find a good developer then they can significantly add value to your company by suggesting alternatives, improvements and by acting as a source of IT advice and information
  • The use of professionally developed bespoke software applications can give you a significant business advantage over your competition
  • The software more closely meets your requirements, as it is developed especially for you.
  • It can be more easily integrated with existing software/other systems you have, reducing data duplication.
  • Custom software is able to perform tasks that your competitors cannot. Possibility to licence the software to other companies to get back some/all of the investment.

(b). Give one way a good application software can be obtained legally. (01 mark)

  • Buying software from authorized vendor.
  • Developing your own software.
  • Downloading free ware.

(c). Katongole wants to design a database for his shop. What will be the importance of the following to him?

(i). Primary key. (01 mark)

  • It uniquely identifies each record entered into a database.

(ii). Data types. (01 mark)

42

ü They attach specific characteristics onto data for proper manipulation.

  1. (a). What is the practical difference between backspace and delete key? (01 mark)
    1. The backspace key erases a character to the left of the cursor, while the delete key erases the character to the right of the cursor.

(b). Describe the following statements:

(i). Selecting text. (01 mark)

  • To choose an object or text so that you can manipulate / change it in some way once

e.g., after choosing text it can be underlined.

ü

(ii). Highlighting text. (01 mark)

  • To make text to look like it was marked with a highlighter pen.

(c). Give any two components of a font. (02 marks)

  • Font size.      ü Underline style.
    • Font colour. ü Font effect.
    • Font face. ü Character spacing.
    • Font style.
  • (a). What is a Graphical User Interface (GUI) environment.                (01 mark)
    • It is a point and click software platform that involves the use of menus, icons, shortcut key and others.

(b). Mention two advantages of using a Graphical User Interface (GUI) over a

Command Line Interface (CLI). (02 marks)

  • It is user friendly.
    • Commands and instructions are kept in pictorial objects – icons. ü It is easy to understand.

(c). Give two factors a user will consider before buying a computer program.

(02 marks)

  • Cost of the program.         ü Free from computer bugs.
    • Usability of the program. ü Software support and call centres. ü System requirements. ü Type and quality of software ü Type of program needed. developer.

\Needs of the organization.

nctionalities of the program.

  1. Write True (T) or False (F) against the following statements.

a). T

b). F

43

c). F

d). T

e). T

  1. (a). Define a computer laboratory.                                                        (01 mark)
    1. A computer laboratory is a place where students learn practical uses of computers, such as programming or how to use a spread sheet program.

(b). State two ways computer hardware can be kept safe in a laboratory.

(02 marks)

  • Burglar proofing the room.
    • Installing fire prevention and control equipment.
    • Providing stable power supply.
    • Installing lightening arrestors on the computer room
    • The room should be well laid out with enough space for movement.
    • Dust and dump proofing the computer room.
    • Cables and power sockets should be well insulated and of the correct power rating to avoid short circuits that can damage computer components.
    • The users should not eat or drink in the computer laboratory.

(c). Mention two accidents commonly experienced in a computer laboratory.

(02 marks)

  • Fire accidents.
    • Skin cuts.
    • Lightening.
    • Electric shocks.
  1. (a). Mention one example of chart that is appropriate to represent the following data selection.

(i). Rental expenditure for a year. (01 mark)

  • Pie chart.
    • Doughnut graph. ü Line graph.
    • Bar chart

(ii). Performance comparison for three streams A,B and C. (01 mark)

  • Column graph.
    • Line graph.
    • Scatter graph. ü Bubble graph.

(b). Give two characteristics of a good programming language. (02 marks)

  • Simplicity: A good programming language must be simple and easy to learn and use.
    • Naturalness:- A good language should be natural for the application area, for which it has been designed. That is, it should provide appropriate operators, data

44

structures, control structures, and a natural syntax to facilitate the users to code their problem easily and efficiently.

  • Abstraction:- Abstraction means the ability to define and then use complicated structures or operations in ways that allow many of the details to be ignored. The degree of abstraction allowed by a programming language directly effects its writ ability. Object oriented language support high degree of abstraction. Hence, writing programs in object oriented language is much easier. Object oriented language also support re usability of program segments due to this features.
  • Efficiency :- Programs written in a good programming language are efficiently translated into machine code, are efficiently executed, and acquire as little space in the memory as possible. That is a good programming language is supported with a good language translator which gives due consideration to space and time efficiency.
  • Structured:- Structured means that the language should have necessary features to allow its users to write their programs based on the concepts of structured programming. This property of a moreover, it forces a programmer to look at a problem in a logical way, so that fewer errors are created while writing a program for the problem.
  • Compactness :- In a good programming language, programmers should be able to express intended operations concisely. A verbose language is generally not liked by programmers, because they need to write too much.
  • Locality :- A good programming language should be such that while writing a programmer concentrate almost solely on the part of the program around the statement currently being worked with.

(c). State one example of a high level programming language. (01 mark)

18. (a).Mention two services offered by an Internet Service Provider (ISP) (02 marks) ü Internet connectivity.

45

  • Voice calls.
  • Website hosting.
  • Content filtering.

(b). Give two examples of ISPs in Uganda. (02 marks)

  • MTN ü Vodacom
  • UTL ü Smart
  • Airtel
  • Smile
  • Infocom
  • Afsat

(c).What is the function of a web server? (01 mark)

  • Web servers are computers that deliver (serves up) Web pages.
  1. (a). Mention one function of the following Windows’ icons:
(i). Recycle bin ü It keeps recently deleted work from the computer.(01 mark)
(ii). My Computer.(01 mark)
  • My Computer is shows all resources in the computer including drives, control panels and data.

(iii). Internet Explorer. (01 mark)

  • Internet Explorer enables the user to view content in the Website.

(b). Why should a user shut down a computer well? Give two reasons.(02 marks)

  • It enables the computer carry out its routine of file management well.
    • It enables the computer to register components under its care.
    • To enable the computer to start with no interruption at the next booting process. ü To control dangers of damaging the operating system.



Share this:


EcoleBooks | ICT Questions and Answers

administrator

2 Comments

  • EcoleBooks | ICT Questions and Answers

    Wasimwamu Hassan Ibrahim, May 15, 2024 @ 5:09 am Reply

    This is so much better.

  • EcoleBooks | ICT Questions and Answers

    NAMIYINGO MARIA LOVINSAH, April 10, 2024 @ 12:19 pm Reply

    NICE WORK

Leave a Reply

Your email address will not be published. Required fields are marked *

Accept Our Privacy Terms.*