THE GOLDEN TRAINING INSTITUTE

"The best education your can trust"

Computer Laboratory

is a space which provides computer services to a defined community.

Gti Students

Student's Graduation day at The Golden Training Insitute(Gti) at 13 th February, 2016

Assignment 3

      

    INSTRUCTIONS
1).    Attempt ALL questions in sections A, B and C.
2).    Write only short answers.

SECTION A: 30 MARKS
1). Select the best alternative from the below and write its letter against the question number in the answer sheet provided:
i). The transmission of data of all kinds (text, graphics, sound and video) over a variety of different communication channels such as public telephone lines, private cables, microwave and satellite.
A.      Telecommunication
B.      Communication
C.      Information
D.      Data

ii). What is the other name for a LAN card?
A.      Modem
B.      NIC
C.      Network connector
D.      Internet card

iii). Which is not a web browser?
A.      Microsoft internet explorer
B.      MS DOS
C.      Opera
D.      Netscape navigator

iv). Which of the following application is best suited for performing calculation and analyzing data?
A.      Presentation
B.      DTB program
C.      Database program
D.      Spreadsheet program

v). Microprocessor is a?
A.      Software associated with integrated circuits
B.      Computer software
C.      Computer printer
D.      Computer hardware



vi). In excel a cell address is specified by a
A.      Box number
B.      Function
C.      Row or column
D.      Column and row

vii). Another name for temporary storage is the?
A.      Secondary storage
B.      Main memory
C.      Flash memory
D.      Magnetic tape

viii). The type of network topology whereby data flows in only one direction is known as a?
A.      Ring
B.      Linear
C.      Star
D.      Bus

ix). In IP addresses, maths.udsm.ac.tz, represents
A.      Domain
B.      Webpage
C.      Organization
D.      Computer name

x). In word processors, which document viewing option best present how the document is organized?
A.      Normal view
B.      Web layout view
C.      Reading layout view
D.      Print layout view

i).
ii).
iii).
iv).
v).
vi).
vii).
viii).
ix).
x)











2).  Match the items in A to those of B and write its letter against the question number in the answer sheet provided:
         LIST A
                                LIST B
i).Technology
ii).Icons
iii).Security
iv).Bullets
v).Communication
vi).Queuing
vii).De-encryptions
viii).Typeface
ix).Clipboard
x).Multi-tasking
A.      Activity of more than one task or program executed at a time
B.      Changing the readability of a document
C.      Allows you to copy and move information within an application or among applications.
D.      Tools and processes that transform output
E.       Pictures representing different application program
F.       Involves transfer of data
G.     Prioritization of documents for the printer
H.      A style of print
I.        Protection of information system
J.        Symbols that set points apart in a document
K.      Transformation of cipher text to plain text

i).
ii).
iii).
iv).
v).
vi).
vii).
viii).
ix).
x)











3). In the following items, write (TRUE) for True statements and (FALSE) for False statements.
i).               Encrypted data is not directly usable.
ii).              Magnetic tape can handle sequential data storage and retrieval only
iii).            A complete computer system has two parts which are hardware and software
iv).            The delete key erases characters to right of the cursor
v).             All computer viruses are destructive.
vi).            Bar code readers use laser beams to convert patterns of printed bars into codes that a computer can understand
vii).          Plug and play allows users to dispose off files and retrieve them later.
viii).         You can access the World Wide Web using the web browser program. In ms excel if the formula “=b4*c4” is in cell d4, the formula assigned to cell d5 is “b5*c5”
ix).            A scanner is not a computer peripheral
x).             A large computer usually installed in a central computer facility is called mainframe.
i).
ii).
iii).
iv).
v).
vi).
vii).
viii).
ix).
x)











SECTION B: 47 MARKS.
ATTEMPT ALL QUESTIONS IN THIS SECTION

4).  Define the following terms: (6 marks)
  1. Video conference
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….
  1. Fax
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….
  1. Data Encryption
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….
5). a. Mention five (5) computer related crimes (10 marks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
  1. How can we protect ourselves from these crimes? (10 marks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………


  1. Draw a simple excel spreadsheet highlighting: Cell, Cell address and Range (6 marks)












6). a. Differentiate between virus and a worm (4 marks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….
  1. Give three ways through which virus enters our computer system (6 marks)
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..
7). a. What is mail merge? (2 marks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..
  1. What is a password? (2 marks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

SECTION C (24 MARKS): ATTEMPT ONLY TWO QUESTIONS
8). a. Give five common examples of ICT (10 marks)
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..


  1. Explain how these devices are helping trade in the society. ( 5 marks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
9). a. Mention Key four areas of the application of ICT. (4 marks)
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..
  1. Give two instances each of how ICT is helping in those areas (5 marks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………



























































































































































Assignment 2



     






Instruction:
Attempt all questions

1.       Choose the most correct answer for each of the following questions and  put a circle around the most correct answer(20 Marks):

i). The term that best describes the physical components of a computer system is? 
A.      Hardware.
B.      Freeware.
C.      Software.
D.     Courseware.

ii). In micro-computers, it is considered as a portable digital device
A.      Photocopier.
B.      Desktop computer.
C.      Personal digital assistant.
D.     Computer screen.

iii). Executing one of the following can slow down the computer’s performance 
A.      Running several software applications at the same time.
B.      Using a small computer monitor.
C.      Increasing the amount of RAM available in the computer.
D.     Printing documents at a low resolution.

iv). An input device most likely used to input a photograph into a computer is called?
A.       Stylus.
B.      Microphone.
C.      Plotter.
D.     Scanner.

v). Which one of the following statements about RAM is true? 
A.      RAM retains data when the computer shuts down.
B.      RAM is read and write memory.
C.      RAM is write-only memory.
D.     RAM cannot be increased in any computer.

vi). One of the following properties of a central processing unit (CPU) is measured in gigahertz GHz)
A.      Cost.
B.      Volume.
C.      Speed.
D.     Temperature.



vii). State the most correct statements from the following
A.      A gigabyte is less than a megabyte.
B.      A kilobyte is greater than a megabyte.
C.      A byte is less than a bit.
D.     A terabyte is greater than a gigabyte.

viii). State the odd word out of the following:
A.      Plotter.
B.      Monitor.
C.      Printer.
D.     Scanner. 

ix). …………………can be taken as an example of application software
A.      Windows 7.
B.      Ubuntu.
C.      Macintosh.
D.     Paint.

x). Operating system software can be described as?
A.      Software to control the allocation and usage of hardware resources.
B.      Software to carry out spreadsheet calculations.
C.      Software to operate virus-scanning procedures.
D.     Software to manipulate databases

xi). The raw facts and figures are:
A.      Data
B.      Information
C.      Snapshot
D.     Reports

xii). Which of the following device can store large amounts of data?
A.      Floppy Disk                       
B.      Hard Disk
C.      CDROM                             
D.     Zip Disk

xiii). VIRUS stands for
A.      Very Important Resource Under Search
B.      Virtual Information Resource Under Seize
C.      Verify Interchange Result Until Source
D.     Very Important Record User Searched

xiv). What is the full form of CRT?
A.      current ray tube                        
B.      current ray technology
C.      cathode ray tube                      
D.     cathode ray technology

xv). The Analytical Engine developed during First Generation of computers used ___ as a memory unit
A.      RAM                                      
B.      Floppies
C.      Cards                                     
D.     Counter Wheels

xvi).  The difference between memory and storage is that memory is … and storage is …
A.      Temporary, permanent
B.      Permanent, temporary
C.      Slow, fast
D.     All of above

xvii). Which one of the following should be carried out to safeguard files from loss in case the main copy is  
   damaged?
A.      Backup files to a new location on your computer.
B.      Install password security.
C.      Backup the files regularly and store offsite.
D.     Install a firewall.

xviii). Doing any of these allows a virus to enter a computer:
A.      Downloading files from the Internet onto the computer.
B.      Connecting the computer to a new printer.
C.      Running a virus scan on the computer
D.     Setting the computer monitor to a low resolution

xix). One of the following actions will send an application window on the task bar
A.      Resize
B.      Close
C.      Maximize
D.     Minimize

xx). Software that allows the user to select menu options and icons; makes software easier to use and typically employs a mouse is called?
A.      Graphical User Interface
B.      Application software
C.      Development software
D.     Microsoft user Software

i
ii
iii
iv
v
vi
vii
viii
ix
x
xi
xii
xiii
xiv
xv
xvi
xvii
xviii
xix
xx






















2.       Match the LIST A to LIST B and draw your matching items in the space provided(10 Marks):
LIST A
LIST B
i)         A computer virus
ii)       A Trojan (or Trojan horse)
iii)      A Worm
iv)     A time bomb
v)       A logic bomb
vi)     Macro-viruses
vii)    Anti-virus
viii)  Shareware
ix)     Freeware
x)       Encryption

A.      Is a program that replicates itself over and over in the computer's memory until the computer can barely function.
B.      Viruses that make use of a special customization feature in applications
C.      Is software, generally downloaded from the Internet, which can be freely used and distributed?
D.     Software that scans files for pieces of code, called signatures, which it recognizes as part of a virus.
E.      Is a program that is deliberately created to cause annoyance or alter or delete data.
F.       Scrambles the data and makes it unintelligible without the use of a key.
G.     Is software which can be freely copied and distributed.
H.     Virus that becomes active when a particular activity happens.
I.        Is a virus which lies dormant until a certain date or time or for a period of time.
J.        Is a virus that hides itself inside another legitimate program.

i)         
ii)       
iii)     
iv)     
v)       
vi)     
vii)   
viii) 
ix)     


















3.       Write T for a correct statement and F for a statement that is not correct in the space provided(10 Marks):
i)         Printers produce a hard copy of the output on paper…………………..
ii)       Virtually all computers use some type of screen as their primary output device………….
iii)      A microphone translates speech into an electronic signal…………..
iv)     A trackball acts as a type of overturned mouse……………….
v)       One megabyte is one character which is a number, letter or symbol……………..
vi)     ASCII stands for African Standard Code for Information Interchange…………….
vii)    Bits are grouped together into sets of ten………………..
viii)  Random Access Memory (RAM) holds the current running program and its associated data...
ix)     A Program refers to the software that controls the computer and makes it function…..
x)       Software is a set of instructions that the computer obeys……………

i)         
ii)       
iii)     
iv)     
v)       
vi)     
vii)   
viii) 
ix)     











SECTION B: 40 MARKS

4.       State the keyboard shortcuts for the following expressions:
i)         Display the Help menu………………………….
ii)       Rename the selected item…………………………
iii)      Select multiple individual items in a window or on the desktop……………………
iv)     Close the active item, or exit the active program…………………………..
v)       Switch between open items………………………………….
vi)     Refresh the active window…………………………………..
vii)    Paste the selected item……………………………………..
viii)  Undo an action…………………………………………..
ix)     Redo an action………………………………………..
x)       Open the Start menu…………………………………..


5.       a. Mention and explain the functions of the three parts of a CPU
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………...

     b. Distinguish between RAM and ROM
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………...


6.       Expand the following abbreviations
  1. WYSIWYG…………………………………………………………………………………
  2. VGA………………………………………………………………………………………..
  3. PC…………………………………………………………………………………………..
  4. OS…………………………………………………………………………………………..


7.       Mention two output, and three input devices used in personal computers
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………...



8.       Explain the short procedures of performing the following operations in Ms word
  1. Starting the program
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………...
  1. Saving a file
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………...
  1. Closing the program
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………...

  1. Putting a password to the document
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………...


SECTION C: 20Marks

9.       a. State three editing, and two formatting features in Ms Word
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………...
…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………...

b. Explain five advantages of MS word over a normal type-writer
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………...