1. Computer systems are built from three types of physical components: processors,
memories and 1/O devices.
a) State two tasks of a processor (2 mks)
b) State function of 1/O devices (1 mk)
2. Threats to the safety of computer systems take many forms such as: white-collar
crime, natural disasters, vandalism and careless ness.
Give on way as to how each of these forms of threats can be controlled.
(2 mks)
3. a) Explain the term nibbles as used in data representation in computers
b) Perform the following binary arithmetic giving the answers in decimal
notation. (3 mks)
i) 1110.01111 + 11010001 .011
ii) 1001011.011 - 111.111
4 a) Distinguish between machine and assembly language (2mks)
b) State the type of translator necessary for a program written in: (2mks)
i) High level language
ii) Assembly language
5. Briefly explain the purpose of the following types of program documentation:
(3mks)
a) User manual
b) Reference guide
c) Quick reference guide
6. State any two features of a user-friendly program. (2mks)
7 a) Distinguish between labels and formulae with respect to spreadsheets
(2mks)
b) Consider the entries in the cells below.
Cell B2 B3 C10 C11 C13
Entry 200 100 B2 B3 C10
State the value displayed in cell C13 (2 mks)
8. List three differences between wide area Networks (WAN) and Local Area
Networks (LAN)
(3mks)
9. Study the flowchart segment below and state the last value printed from the
flowchart. (2 mks)
YES
NO
EXIT
10. a) What is an expert system (1mk)
b) State any two components of an expert system (2mks)
11. Give two reasons why optical disks are better storage media compared to floppy
diskettes (2mks)
12. What are the Dos commands used for the following? (2mks)
a) Changing directories
b) Viewing directories
c) Renaming directories
d) Deleting a directory
13. Distinguish between copying and moving text (2mks)
14. a) Name two methods of paper orientation (1mk)
b) Name two keys used to delete text in a document (1 mk)
15. Name two features a Database package (2mks)
No comments:
Post a Comment