You are on page 1of 5

BINDURA UNIVERSITY OF SCIENCE EDUCATION

FACULTY OF SCIENCE AND ENGINEERING

DEPARTMENT OF COMPUTER SCIENCE

INTRODUCTION TO COMPUTER SCIENCE-CS101


TIME:2 HOURS TOTAL MARKS: 100

INSTRUCTIONS TO CANDIDATES
Answer all Questions from Section A, Section B and Section C.
Section A carries 40 marks, Section B carries 40 marks and Section C carries 20
marks.

SECTION A

1. 7558

2. Bold Italic Underline

3. Windows 7,8,10,MacOs

4. Microprocessor

5. Application Software

6. .docx or .doc

7. Peripheral

8. True

9. True

10. Active cell

11. B1:G10

12. 0110001001012

13. 175

14. 1528

Page 1 of 5
15. HyperText Markup Language

16. Web browser

17. Local Area Network

18. Delete

19. Query

20. Topology

21. Special and general purpose

22. Slide or Presentation

23. True

24. 4.7g

25. Mouse,keyboard lightpen etc

26. Antivirus

27. Router

28. Outlook

29. Scanner

30. Cntrl + Z

31. Modem

32. two

33. True

34. cursor

35. Router, modem,repeater, gateway,

SECTION B

Page 2 of 5
Question 1
a. Evaluate, (show your working)
i. 7268
ii. E550F
b. 001100010001
c. High speed, high storage capability
d. Photocopier, Touch Screen, modem
e. Simplex, Half Duplex and full duplex
Question 2
a. Give two differences between an Intranet and the Internet.
The Internet is a wide network of Intranet is a network of computers
computers and is available to all. designed for a certain group of users.

Internet contains a large number Intranet can be accessed from the


of intranets. Internet with specific restrictions.

Number of internet users are very Number of users is limited.


high.

Internet contains various source of Intranet only contains group-specific


information. information.

Anyone can access the internet Accessible only by the organization


employees or admin who have login
details.

It is not as safe as compared to Safe and secure network.


intranet

It is a public network. It is a private network.

b. Give two reasons why companies limit internet access to their employees.
- To boost productivity no time for social media
- To poor concentration at work

Page 3 of 5
- To cut network cost
c. Through the increased usage of internet computer viruses are spreading at a
rapid rate. Explain any three ways in which viruses may be spread in computer
systems. [3]
- Downloading emails from unknown origins
- Visiting unsecured sites
- Downloading pirated softwares’
d. Explain any two actions one can use to safeguard from computer viruses. [2]
- Use of firewalls
- Use of antivirus
e. The banking industry in Zimbabwe has benefited immensely from computer and
information technology. Briefly discuss the various applications of computer
technology to Zimbabwe’s banking industry.
- E-Commerce -online shopping, online advertising 24/7 service
- E-banking - online transacting ,banking self service
- Use of POS machines linked barcode readers has enhanced customer satisfactions
through improved speed in processing transactions
- Closed-Circuit Television (CCTV) technology for security reasons, it reduces risk of
business loss through theft
- Communication – email, video conference using Skype etc.
SECTION C [20 marks]
Question 1

a. Use following words to answer question below


Click, Double Click, Drag and Drop, Click and Drag, Right Click

Match the phrase above to the correct definition by writing the correct
phrase in the space provided.
i. Right Click
ii. Drag and Drop
iii. Click and Drag
iv. Double Click

Page 4 of 5
v. Click
Part b
i. =average(b2:b5)
ii. =sum(c2:c4)
iii. =Min(d2:d4)
iv. =count(a2:a5)

******END OF PAPER******

Page 5 of 5

You might also like