THE GOLDEN TRAINING INSTITUTE

"The best education your can trust"

Assignment 3

      

    INSTRUCTIONS
1).    Attempt ALL questions in sections A, B and C.
2).    Write only short answers.

SECTION A: 30 MARKS
1). Select the best alternative from the below and write its letter against the question number in the answer sheet provided:
i). The transmission of data of all kinds (text, graphics, sound and video) over a variety of different communication channels such as public telephone lines, private cables, microwave and satellite.
A.      Telecommunication
B.      Communication
C.      Information
D.      Data

ii). What is the other name for a LAN card?
A.      Modem
B.      NIC
C.      Network connector
D.      Internet card

iii). Which is not a web browser?
A.      Microsoft internet explorer
B.      MS DOS
C.      Opera
D.      Netscape navigator

iv). Which of the following application is best suited for performing calculation and analyzing data?
A.      Presentation
B.      DTB program
C.      Database program
D.      Spreadsheet program

v). Microprocessor is a?
A.      Software associated with integrated circuits
B.      Computer software
C.      Computer printer
D.      Computer hardware



vi). In excel a cell address is specified by a
A.      Box number
B.      Function
C.      Row or column
D.      Column and row

vii). Another name for temporary storage is the?
A.      Secondary storage
B.      Main memory
C.      Flash memory
D.      Magnetic tape

viii). The type of network topology whereby data flows in only one direction is known as a?
A.      Ring
B.      Linear
C.      Star
D.      Bus

ix). In IP addresses, maths.udsm.ac.tz, represents
A.      Domain
B.      Webpage
C.      Organization
D.      Computer name

x). In word processors, which document viewing option best present how the document is organized?
A.      Normal view
B.      Web layout view
C.      Reading layout view
D.      Print layout view

i).
ii).
iii).
iv).
v).
vi).
vii).
viii).
ix).
x)











2).  Match the items in A to those of B and write its letter against the question number in the answer sheet provided:
         LIST A
                                LIST B
i).Technology
ii).Icons
iii).Security
iv).Bullets
v).Communication
vi).Queuing
vii).De-encryptions
viii).Typeface
ix).Clipboard
x).Multi-tasking
A.      Activity of more than one task or program executed at a time
B.      Changing the readability of a document
C.      Allows you to copy and move information within an application or among applications.
D.      Tools and processes that transform output
E.       Pictures representing different application program
F.       Involves transfer of data
G.     Prioritization of documents for the printer
H.      A style of print
I.        Protection of information system
J.        Symbols that set points apart in a document
K.      Transformation of cipher text to plain text

i).
ii).
iii).
iv).
v).
vi).
vii).
viii).
ix).
x)











3). In the following items, write (TRUE) for True statements and (FALSE) for False statements.
i).               Encrypted data is not directly usable.
ii).              Magnetic tape can handle sequential data storage and retrieval only
iii).            A complete computer system has two parts which are hardware and software
iv).            The delete key erases characters to right of the cursor
v).             All computer viruses are destructive.
vi).            Bar code readers use laser beams to convert patterns of printed bars into codes that a computer can understand
vii).          Plug and play allows users to dispose off files and retrieve them later.
viii).         You can access the World Wide Web using the web browser program. In ms excel if the formula “=b4*c4” is in cell d4, the formula assigned to cell d5 is “b5*c5”
ix).            A scanner is not a computer peripheral
x).             A large computer usually installed in a central computer facility is called mainframe.
i).
ii).
iii).
iv).
v).
vi).
vii).
viii).
ix).
x)











SECTION B: 47 MARKS.
ATTEMPT ALL QUESTIONS IN THIS SECTION

4).  Define the following terms: (6 marks)
  1. Video conference
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….
  1. Fax
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….
  1. Data Encryption
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….
5). a. Mention five (5) computer related crimes (10 marks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
  1. How can we protect ourselves from these crimes? (10 marks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………


  1. Draw a simple excel spreadsheet highlighting: Cell, Cell address and Range (6 marks)












6). a. Differentiate between virus and a worm (4 marks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….
  1. Give three ways through which virus enters our computer system (6 marks)
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..
7). a. What is mail merge? (2 marks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..
  1. What is a password? (2 marks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

SECTION C (24 MARKS): ATTEMPT ONLY TWO QUESTIONS
8). a. Give five common examples of ICT (10 marks)
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..


  1. Explain how these devices are helping trade in the society. ( 5 marks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
9). a. Mention Key four areas of the application of ICT. (4 marks)
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..
  1. Give two instances each of how ICT is helping in those areas (5 marks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………