INSTRUCTIONS
1).
Attempt
ALL questions in sections A, B and C.
2).
Write
only short answers.
SECTION A: 30 MARKS
1). Select
the best alternative from the below and write its letter against the question
number in the answer sheet provided:
i). The transmission of data
of all kinds (text, graphics, sound and video) over a variety of different
communication channels such as public telephone lines, private cables,
microwave and satellite.
A. Telecommunication
B. Communication
C. Information
D. Data
ii). What is the other name for a LAN card?
A. Modem
B. NIC
C. Network connector
D. Internet card
iii). Which is not a web browser?
A. Microsoft internet explorer
B. MS DOS
C. Opera
D. Netscape navigator
iv). Which of the following application is best
suited for performing calculation and analyzing data?
A. Presentation
B. DTB program
C. Database program
D. Spreadsheet program
v). Microprocessor is a?
A. Software associated with integrated circuits
B. Computer software
C. Computer printer
D. Computer hardware
vi). In excel a cell address is specified by a
A. Box number
B. Function
C. Row or column
D. Column and row
vii). Another name for temporary storage is the?
A. Secondary storage
B. Main memory
C. Flash memory
D. Magnetic tape
viii). The type of network topology whereby data
flows in only one direction is known as a?
A. Ring
B. Linear
C. Star
D. Bus
ix). In IP addresses, maths.udsm.ac.tz, represents
A. Domain
B. Webpage
C. Organization
D. Computer name
x). In word processors, which document viewing
option best present how the document is organized?
A. Normal view
B. Web layout view
C. Reading layout view
D. Print layout view
|
i).
|
ii).
|
iii).
|
iv).
|
v).
|
vi).
|
vii).
|
viii).
|
ix).
|
x)
|
|
|
|
|
|
|
|
|
|
|
|
2). Match the items in A to those of B and write its letter against the question
number in the answer sheet provided:
|
LIST A
|
LIST B
|
|
i).Technology
ii).Icons
iii).Security
iv).Bullets
v).Communication
vi).Queuing
vii).De-encryptions
viii).Typeface
ix).Clipboard
x).Multi-tasking
|
A.
Activity of more
than one task or program executed at a time
B.
Changing the
readability of a document
C.
Allows you to copy
and move information within an application or among applications.
D.
Tools and processes
that transform output
E.
Pictures
representing different application program
F.
Involves transfer of
data
G.
Prioritization of
documents for the printer
H.
A style of print
I.
Protection of
information system
J.
Symbols that set
points apart in a document
K.
Transformation of
cipher text to plain text
|
|
i).
|
ii).
|
iii).
|
iv).
|
v).
|
vi).
|
vii).
|
viii).
|
ix).
|
x)
|
|
|
|
|
|
|
|
|
|
|
|
3). In the following
items, write (TRUE) for True statements and (FALSE) for False statements.
i).
Encrypted data is not directly usable.
ii).
Magnetic tape can handle sequential data storage and retrieval
only
iii).
A complete computer system has two parts which are hardware and
software
iv).
The delete key erases characters to right of the cursor
v).
All computer viruses are destructive.
vi).
Bar code readers use laser beams to convert patterns of printed
bars into codes that a computer can understand
vii).
Plug and play allows users to dispose off files and retrieve them
later.
viii).
You can access the World Wide Web
using the web browser program. In ms excel if the formula “=b4*c4” is in
cell d4, the formula assigned to cell d5 is “b5*c5”
ix).
A scanner is not a computer peripheral
x).
A large computer usually installed in a
central computer facility is called mainframe.
|
i).
|
ii).
|
iii).
|
iv).
|
v).
|
vi).
|
vii).
|
viii).
|
ix).
|
x)
|
|
|
|
|
|
|
|
|
|
|
|
SECTION
B: 47 MARKS.
ATTEMPT
ALL QUESTIONS IN THIS SECTION
4). Define the following
terms: (6 marks)
- Video conference
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….
- Fax
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….
- Data Encryption
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….
5). a. Mention five (5) computer related crimes (10 marks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
- How can we
protect ourselves from these crimes? (10 marks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
- Draw a simple
excel spreadsheet highlighting: Cell, Cell address and Range (6 marks)
6). a. Differentiate between virus and a worm (4 marks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….
- Give three ways
through which virus enters our computer system (6 marks)
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..
7). a. What is mail merge? (2 marks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..
- What is a
password? (2 marks)
…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….
SECTION C (24 MARKS): ATTEMPT ONLY TWO
QUESTIONS
8). a. Give five common examples of ICT (10 marks)
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..
- Explain
how these devices are helping trade in the society. ( 5 marks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
9). a. Mention Key four areas of the application of ICT. (4
marks)
………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………..
- Give two
instances each of how ICT is helping in those areas (5 marks)
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………






