You are on page 1of 7

PROPOSED ANSWERS

SECTION A: MARKING GUIDE

1 B 18 A
2 C 19 B
3 B 20 D
4 B
5 B
6 B
7 A
8 A
9 A
10 B
11 A
12 B
13 B
14 D
15 C
16 C
17 B

SECTION B :MARKING GUIDE

QUESTION ONE (6MKS)

i) Characteristics of first and second generation computers.


- Computers were too large, use of vacuum tubes, use of Transistors.
- Produce a lot of heat, were unreliable in performing task

ii) General purpose computers are used to perform a wide range of activities while special
purpose computers are used to perform specific task.
iii) RAM is volatile memory while the hard disk is nonvolatile.
.RAM provides temporal storage while the hard disk ensures permanent storage.

QUESTION TWO (6MKS)


i) Installed anti-virus, update anti-virus, avoid opening suspicious mails on your computer
ii) Four features of GUI
- Icons – menus – mouse/pointer-windows (2mks)
iii) Primary storage holds data and instructions that are being processed while secondary storage
is a type of nonvolatile memory that provides permanent storage to data and information.
Examples of primary storage: RAM, Example of secondary storage: the hard disk.

iv) Application software enables users accomplish task on the computer while system software
controls and coordinates hardware and software in the computer system example of application
software are ms word, excel ,example of software application is operating system.

QUESTION THREE (6mks)


i) Two main parts of CPU are ALU and control unit.
(2mks)

ii) Firmware is a program that comes embedded in a piece of hardware such as BIOS by the
manufacturer.
(1mk)
iii.) Peripheral are devices that are connected externally to the
computer system unit eg keyboard, mouse (1mk)
iv.)Advantages of computers in business: Accuracy, speed, convenience, communication etc In
carrying out business activities.

QUESTION FOUR (6MKS)

i) Utility software .These are programs design to perform task related to managing the
computer system. Examples: cleanup, disk defragmentation etc. (2mks)
ii) A modem is a device that converts analogue signals to digital signals and vice versa. It
differs from a flash drive in that it does no store data as a flash memory. (2mks)
iii) Two functions of the operating system (2mks)
 Device management
 Memory management

QUESTION FIVE: (6MARKS)

i) A CBIS is an organised integration of hardware and software technologies and human


elements designed to produce timely, integrated, accurate and useful information for decision
making purposes.
ii.) The components of CBIS are; (5mks)

 Hardware– these are the devices like the monitor, processor, printer and keyboard, all of
which work together to accept, process, show data and information.
 Software– are the programs that allow the hardware to process the data.
 Databases– are the gathering of associated files or tables containing related data.
 Networks– are a connecting system that allows diverse computers to distribute resources.
 Procedures– are the commands for combining the components above to process
information and produce the preferred output
 .
QUESTION SIX. (6MKS)

 POST: Power on self-test


 USB: Universal serial bus
 DOS: Disk operating system
 DBMS: Database management software

ii) A client server network is a type of network that uses one computer to coordinate and supply
services to other nodes on the network. (2mks)

SECTION C ANSWERS ( 50marks)

QUESTION ONE: (15MKS)


i) Network topology is the structure and physical arrangement of computers and other
hardware on a network.

Here are some of the topologies that are used to create networks:
Star Topology
A central node connects a cable to each computer in the network in a star topology. Each
computer in the network has an independent connection to the center of the network, and one
connection breaking won't affect the rest of the network. However, one downside is that many
cables are required to form this kind of network.

Bus Topology
In a bus topology network connection, one cable connects the computer. The information for the
last node on the network has to run through each connected computer. There is less cabling
required, but if the cable breaks it means that none of the computers can reach the network
Ring Topology
A ring topology is similar to a bus topology. It uses a single cable with the end nodes connected
to each other so the signal can circle through the network to find its recipient. The signal will try
several times to find its destination even when the network node is not working properly. A
collapsed ring has a central node which is a hub, router or switch. The device has an internal
ring topology and has places for cable to plug in. Every computer in the network has its own
cable to plug into the device. In an office, this probably means having a cabling closet, where all
computers are connected to the closet and the switch.

ii) Sign and symptoms of a computer virus are,


 Your operating system slows to a crawl.
 Your system's available memory suddenly shrinks in size.
 Important files become corrupted.
 Your computer screen starts displaying odd images or messages

iii) Hardware are components that can be torch or seen and carry from one place to the other eg
mouse, monitor
(b) Two advantages of a star network: Easy to connect new nodes, centralized
management.
Two disadvantages: Breakdown of the central unit affects the entire network, too much
dependency by client computers on the central unit can lead to constant breakdown of the
server. (2mks)
QUESTION TWO: (15Mks)
I.
i)A computer network is a group of computers linked to each other that enables the computer to
communicate with another computer and share their resources, data, and applications
ii) advantages of using computer networks include the following:
 file sharing, which enables users to share data between users;
 resource sharing, which enables users to share multiple devices, such as copiers and
printers;
 communication, which enables users to send and receive messages and data in real time
from multiple devices;
Disadvantages of a computer network are,

 Purchasing the network cabling and file servers can be expensive.


 Managing a large network is complicated, requires training and a network manager
usually needs to be employed.
 If the file server breaks down the files on the file server become inaccessible. Email
might still work if it is on a separate server. The computers can still be used but are isolated.
 Viruses can spread to other computers throughout a computer network.
 There is a danger of hacking, particularly with wide area networks. Security procedures
are needed to prevent such abuse, eg a firewall.

iii) A client server network is a type of network which has a dedicated server that that
controls other nodes in a network while peer to peer network is network in which all the nodes
are equal without the dedicated server
iv) Application areas of computers are,

 Business: The use of computer in the field of business is increasing day by day.


Computers are being the heart of the modern business. Every organization wants to expand
globally and without a computer, this is not possible. Shops, malls, supermarkets, and
hypermarkets use computers for file management, calculating the bills, office communication,
administrative work, decision making, etc. Many business activities are performed quickly and
effectively by using a computer. A business organization can use the computer for product
promotion and interact with the customer, to provide online services.
 Education: In an educational institution, computers are used information resources,
teaching aid, library system, research mode, result system, database keeping for students as
well as staff, billing as well as the accounting system, examination system, etc

 Communication: Communication has become easier, faster, cheaper and more reliable


due to the use of the computer. One can communicate with peoples or societies in another part
of the world by sitting within a small room. People can share, views, ideas and file video
conferencing is possible due to the computer.
 Entertainment: Computers are also playing a very important role in entertainment.
Computers have become a need of humans for entertainment. The computer can be taken as a
good means of entertainment. Computers are used in entertainment for playing games, listening
to music, watching movies and videos, watching the TV program, etc

QUESTION THREE

i) Microsoft Excel is a spreadsheet program used to create grids of text, numbers and formulas
specifying calculations
ii) An active cell refers to a cell in spreadsheet that is currently selected by clicking mouse
pointer or keyboard keys. It is bounded by heavy borders around it
iii) use it to record expenditures and income, plan budgets, chart data and succinctly present
fiscal results.
iv) Formula bar
v) a) =B3+C3+D3
b) =F3/400X100
C) =F3/4

Database Access
i. Microsoft Access is a database management system (DBMS) from Microsoft that combines
the relational Microsoft Jet Database Engine with a graphical user interface and software-
development tools. 
ii. Microsoft Access is an information management tool that helps you store information
for reference, reporting, and analysis. 
Microsoft Access helps you analyze large amounts of information, and manage related
data more efficiently than Microsoft Excel or other spreadsheet applications.
iii 3. three

iv. A single data in one table is linked with a single data in another table.

v. A single data in a table is linked to several data’s in another table


vi. Where several data’s in one table is related to several other data’s in another
table

You might also like