You are on page 1of 3

 

1. Outline the five different technologies used in defining the History of Computers.

          QUESTION 1 [20 MARKS]


 a.
b.
c.
d.
e. 

1. Describe any five (5) considerations when creating a password

.                                                   (5marks);
a.
b.
c.
d.
e.

1. Explain the term ICT                                                      (2marks)

a. ICT means the technology that supports activities involving information.


 
 
 
QUESTION 2 [20 MARKS]
 

1. Describe any five(5) types of utility software                                            (10


marks)

TYPES OF UTILITY DESCRIPTION

a.Antivirus It helps to keep the computer virus free,


for example an avast antivirus

b.File management system Used to manage files of the computer


system, for example google desktop

c.Backup Refers to duplicating the disk information


so that the data can be restored.

d.Compression tools Means to maintain the storage space,


examples 7zip

e.Disk clean up It helps to free up disk space, example


CC cleaner

1. Explain three advantages of using Cloud computing.                 (3marks)

 a. Backup and restore data:


b. Mobility:
c. Low maintenance cost:

1. Explain the following types of license agreements (4 marks)

a.Proprietary license:
b.Open source license
c.Shareware / Trial version license: the use is free to download but it is used over a
specified period of time.
d.Freeware license: the free use to download and use without distributing.
 

1. Explain the 5-step sequence a computer goes through when booting.


(5marks)

           
 
QUESTION 3 [20 MARKS]
 

1. Describe any five (5) characteristics of computers, which make them essential.


(10marks)
 

1. List any three (3) types of output devices.                                       (3marks)

1. State any two (2) differences between Solid State Drive and Flash Disk.
(4marks)

 
 

1. Compare and contrast, Primary memory vs secondary memory. (4marks)       

 
 
 
QUESTION 4 [20 MARKS]
 

1. Explain the use of the protocol HHTP in web browsing. List two security features
to be aware of when browsing the web.                                                   (4marks)

1. Describe the following terms;

1. World wide web (2marks)


2. Voice over Internet Protocol (2marks)
3. Blogging (2marks)
4. Bandwidth (2marks)
5. Software as A Service (2marks)                                

1. Describe three (3) differences between Broadband and Fiber Connection


methods.    

(6marks)
                     (100marks)
 

You might also like