Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
50% found this document useful (2 votes)
2K views

Computer Packages Theory Paper

Uploaded by

jameskioko91
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
50% found this document useful (2 votes)
2K views

Computer Packages Theory Paper

Uploaded by

jameskioko91
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

NAKURU VOCATIONAL TRAINING CENTRE

P.O BOX 3973-20100, NAKURU TEL: 0702 474 169

Computer Packages Theory Paper.


NAME: ………………………………………………. DATE……………....................
INSTRUCTIONS
• Note: The paper is divided into five sections.
• Answer all the questions in every section.
• Time is 2 1/2 HR

SECTION A : Introduction to Computer.

1. What is a Computer?
2. Why is a computer referred to as an electronic device?
3. Define the following terms as used in computer science.
a). Data.
b). Programs.
c). Data processing.
d). Information.
4. (a) Briefly explain the two forms of data.
(b) Give THREE differences between Data and Information.
5. The speed of a computer is measured in ___________.
6. What does the term GIGO stand for?
7. List and explain 4 salient features/ properties of a computer.
8. List FIVE advantages of a computerized system over a manual system.
1. List down the components that make up a computer.
2. Clearly draw and label the main physical parts of a simple computer system.
3. (a). Name and explain the two main divisions of computer storage.
(b). Give two common examples of secondary storage devices.
4. Name two output devices.
5. (a). Explain the term System unit.
(b). Name some of the components found in the System unit.
6. Why is the screen also called a Monitor?
7. What was the most remarkable discovery during the second computer generation?
8. What is Artificial Intelligence?
9. Name any FOUR classes of computers based on size and complexity.
10. Explain various ways computers have been mostly used in our country.
11. List down THREE safety precautions one should observe when entering a Computer room.
12. Why must foods and beverages be kept out of the computer room?
13. Give THREE reasons why it is important to regularly service the computer.
14. State two functions of the UPS.
15. State two reasons that are likely to cause eye-strain in the computer room.
SECTION B : Microsoft Word.
1. (a). What is Microsoft Word?
(b). Under what category of applications does Microsoft Word fall in?
(c). Apart from Microsoft Word, name two other Word processing programs.
(d). What is the importance of Microsoft Word to the Market today?
2. (a). What are the advantages of using a template to create a document?
(b). List 5 types of documents where you would use a template.
3. Name TWO keys used to delete a text in a document.
4. What is the function of the following combination of keys in Microsoft Word?
(a). Ctrl+Z. (b). Ctrl+Y.
(c). Ctrl+A. (d). Ctrl+P.
(e). CTRL+B. (f). CTRL+E.
5. (a). Explain the term document formatting.
(b). Give any five document formatting features.
(c) Give at least four examples of fonts available in Microsoft Word.
(d) In Microsoft Word, what does the term UPPERCASE mean?
6. Name and describe the TWO types of paper orientation in Word processing.
7. Why is it necessary to specify the correct paper size before printing a document?
8. How would you insert Footer to your document?
9. (a). Give Two examples of modern Word processors.
(b). Give 2 advantages and 3 disadvantages of using Microsoft Word.

SECTION C : Microsoft Excel.


1. Define a Spreadsheet.
2. Differentiate between the traditional analysis ledger sheet and an electronic spreadsheet.
3. Name three commonly spreadsheet packages.
4. Explain five application areas where spreadsheet software can be used.
5. Explain THREE cell data types in spreadsheet. (6 marks).
6. What causes the following error messages in Microsoft Excel. Show how we can solve them.
(i). #####
(ii). #VALUE!
(iii). #DIV/0!
(iv). #NAME?
7. What is a Chart?

SECTION D : Microsoft Powerpoint.


1. What type of software is Microsoft PowerPoint?
2. Give examples of situations where you can use PowerPoint presentations.
3. Give TWO ways in which you can create a PowerPoint presentation.
4. Explain the difference between Slide view and Normal view.
5. What is the difference between Animation effects and Transition effects on a slide?
6. (i). What is a Slide Master?
(ii).What kind of information is usually included on a Slide Master?
7. (i). What are Speaker Notes?
(ii). In what view can you type in Speaker Notes?
SECTION E : Internet and E-mail.

1. State the various methods of accessing computer and locating files.


2. Describe the main benefits from the use of the Internet.
3. Give a brief view of the main problems of the Internet.
4. Briefly describe four advantages of using Internet to disseminate information compared to other
conventional methods. (8 marks).
5. One of the problems of using Internet for business is insecurity. What are some of the other problems and
what controls should be put in place in order to solve the problems?. (4 marks).
6. Your manager wishes to be connected to the Internet. He already has a powerful Personal Computer (PC), a
Printer and access to a Telephone line. However, he understands that he will need a Modem.
Required:
(a). State why a Modem is required to connect him to the Internet. (2 marks).
(b). Suggest any four application areas in which you would expect a Supermarket retail manager to use the
Internet. (4 marks).

SECTION F : Data Security.

1. (a) What is Computer security?


(b) Mention various threats to computer security.
2. Explain any three threats to data and information.
3. Give two control measures one would take to avoid unauthorized access to data and information.
4. Explain the meaning of ‘industrial espionage’.
5. (a) Define a computer virus.
(b) Give and explain two types of computer viruses.
(c) List three types of risks that computer viruses pose.
(d) List and explain five sources of computer viruses.
(e) Outline four symptoms of computer viruses.
(f) Explain the measures one would take to protect computers from virus attacks
6. How can one control the threat of user’s errors to data and information?
7. (a) Define the term ‘Computer crime’.
(b) State and explain various types of computer crimes.
8. Differentiate between Hacking and Cracking with reference to computer crimes.
9. What is a program patch? Why are patches important?
10. Give two reasons that may lead to computer fraud.
11. How can piracy be prevented in regard to data and information.
12. What is data alteration? Explain its effects on data.
13. Explain the meaning of Tapping while dealing with computer crimes.
14. Define ‘Data backup’ and state its importance.
15. State and discuss four causes of data loss in a computer system.
16. (a) Discuss two methods used to restrict unauthorized access to computer systems.
(b) What is a Password? Give its main importance.

You might also like