Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Cit 100 Marking Guide

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

QUESTION ONE

A
1. A(n) __COMPUTER________ is a machine that performs four basic operations: input,
processing, output, and storage.
2. A(n) ___PROGRAM_ is a list of instructions that tells the computer how to perform a task.
3. The _____HARDWARE____ includes the physical components of the computer, including
the computer itself as well as the keyboard, monitor, and speakers.
4. __RAM OR RANDOM ACCESS MEMORY __ is used to temporarily store the programs
and data with which the CPU interacts.
5. The most common ______INPUT DEVICES__ are the keyboard, mouse, and microphone.
6. The most common _______OUTPUT DEVICES___________ are monitors and printers.
7. ____SUBNOTEBOOKS___are notebook computers that omit some components (such as a
CD-ROM drive) to cut down on weight and size.
8. ____________SUPERCOMPUTERS________________ are ultrafast computers that
process large amounts of scientific data and then display the underlying patterns that have been
discovered.
9. A(n) ________NOTEBOOK______________________ is a portable computer which
usually weighs 4-8 pounds (2 to 4 kilograms), depending on display size, hardware e.t.c.
10. A(n) ___________NETWORK_________________________________ is a group of two
or more computer systems connected together to share devices and resources.
11. ______APPLICATION SOFTWARE________________ consists of all of the programs
that can be used to perform a task, such as writing a research paper or browsing the Web.
12. _____SYSTEM SOFTWARE_____________________ includes all of the programs that
enable a computer to function, the most important being the operating system (OS).
13. ______COMPUTER EITHICS__________________ explores computer-related moral
dilemmas and defines ethical principles for computer professionals.
14. _COMMUNICATIONS_ involves moving data within the computer or between
computers.
15. _______CLIENTS__________________________ are desktops, laptops, workstations, or
any other computer for individuals, that contact a server to obtain needed information.

B.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

T F T T T T T F T T T F T T T
QUESTION TWO Short answers
(a) Write the steps to replace the word “detection” which appears
100 times in word document with 200 pages [3
marks]
1. Go to menu -->Find & Replace
2. Enter the word or phrase you want to replace in Find what.
3. Enter your new text in Replace with.
4. Choose Replace All to change all occurrences of the word or
phrase. ...

(b) Mention four the advantages of word processor application


over type write machine. [4
marks]
1. Corrections can easily be made to your work before a
document is printed or saved
2. Easy formatting of document
3. You can make use of large number of templates available
4. The language tools available in word processor software give
us advantages, too
5. You can save your current work, close the document and
come back to it later time
6. You can import data from database or spreadsheet or any
other application and then include it in your document.

NOTE: The above advantages are not the only one others can be found in compendium
page 76-77

(c) What is clipboard? And how does it used in word processor?


[4 marks]
A clipboard is a temporary storage area for data that the user
wants to copy from one place to another. In a word processor
application, for example, the user might want to cut text from one
part of a document and paste it in another part of the document
or somewhere else.

(d) State the function of the following shortcut keys in word


processor (i) Ctrl+C and (ii) Ctrl+V [3 marks]
Ctrl + C -----Means copy text
Ctrl + V -----Means paste text
(e) Word processor provide features for creating table content
mention its advantage in long word document [3 marks]
1. Make a good impression. A document with a table of contents has a
more professional appearance than a document without one.
2. Manage reader expectations. The TOC gives readers a high-level view
of the content in the document.
3. Provide a road map. Readers need familiar points of reference for
quickly locating important information.
4. Arrange your material. When you’re creating or editing a document, a
TOC helps outline and organize your thoughts so you don’t leave out
anything important

NOTE: The above advantages are not the only one

(f) Mr. Ayubu was writing a document using word processor in


Swahili language and later all the text where underline by red
color. Why red color appears in all texts in that document?
[3
marks]
In word processor the text is underline by red color if there is spelling
mistake. Microsoft word understand English language the red color appears
because the Ayubu’s document is written in Swahili language.

QUESTION THREE
Consider the worksheet in figure 1, and answer questions underneath:

(a)What is the name of the active worksheet? [01 mark]


Answer: Sales2022,
(b)What is the name of an active cell? [01 mark]
Answer: U22
(c) What will = E6 < E10 formula return if applied in the given worksheet? [1.5
marks]
Answer: FALSE
(d)Mention two (2) types of data that can be entered in a cell. [02 marks]
Answer: Basic data types are numbers, text, date, but also you can consider
currency, Percentage, Formulas
(e) What is the possible cause of error #NAME? in cell J7? [1.5 marks]
Answer:

(f) Among the following cell references, which ones are invalid $J5, $G$5, $5B,
E11, 6$F$? [02 marks]
Answer: $5B, 6$F$

(g) Write a formula that will determine the minimum annual sales collected by
an individual. [02 marks]
Answer: =MIN(E3:E10)

(h)Propose a formula to be entered in cell E11 to calculate overall amount of


annual sales for all sales representatives. [02 marks]
Answer: =SUM(E3:E10)

(i) Write a general formula for cell F3 to calculate the amount of tax paid. Hint:
Tax paid = Annual sales*tax rate. [02 marks]
Answer: = E3*$J$3 or = E3*J$3
(j) If the formula proposed in F3 is copied to cell F5, what will be the formula in
cell F5? [01 mark]
Answer: = E5*$J$3 or = E5*J$3

(k)Provide a formula which can calculate total amount of sales for female sales
persons only. [02 marks]
Answer: =SUMIF(C3:C10, ‘F’, E3:E10)

(l) In cell G3, provide a formula that will display “Award” if the annual sale of an
individual is greater than 800,000; otherwise, display “No award”.
Answer: IF (E3>800,000, “AWARD”, “No AWARD”)

QUESTION FOUR

(a) Describe two (2) categories of networks according to


architecture. [06 marks]

Peer-To-Peer network

o Peer-To-Peer network is a network in which all the computers


are linked together with equal privilege and responsibilities
for processing the data.
o Peer-To-Peer network is useful for small environments,
usually up to 10 computers.
o Peer-To-Peer network has no dedicated server.
o Special permissions are assigned to each computer for
sharing the resources, but this can lead to a problem if the
computer with the resource is down.

Client/Server Network

o Client/Server network is a network model designed for the


end users called clients, to access the resources such as
songs, video, etc. from a central computer known as Server.
o The central controller is known as a server while all other
computers in the network are called clients.
o A server performs all the major operations such as security
and network management.
o A server is responsible for managing all the resources such
as files, directories, printer, etc.

(b)Mention three (3) protocols used on the internet or networking.


[

Hypertext Transfer Protocol (HTTP).


The File Transfer Protocol (FTP)
The Telnet Protocol
Internet Protocol

(c) Use examples to differentiate between DNS and URL? [04


marks]

DNS (Domain Name System ) software

This program, which coordinates the IP addresses and domain


names for all computers attached to it.

Is a naming database in which internet domain names are located


and translated into Internet Protocol (IP) addresses. The domain
name system maps the name people use to locate a website to the
IP address that a computer uses to locate that website.

Uniform Resource Locator (URL).

Is a unique identifier used to locate a resource on the


Internet. It is also referred to as a web address.
A URL is a type of uniform resource identifier and is address of a
resource on the World Wide Web and the protocol used to access
it. It is used to indicate the location of a web resource to access
the web pages.

URLs consist of multiple parts -- including a protocol and domain


name -- that tell a web browser how and where to retrieve a
resource. example
https://developer.mozilla.org/en-US/docs/Learn/

(d)List four (4) examples of internet service provider in Tanzania.


[02 marks]

TTCL, Vodacom, Airtel Tanzani, Zantel, etc.

(e) State any five (5) types of infections that a computer may be
exposed. [05 marks]

 Computer viruses are designed to attack your system. They


spread from machine to machine via shared links, uploaded
and downloaded files, or compromised websites. People
spread viruses when they link and share carelessly or don’t
use proper antivirus protection.
 Worms are similar to viruses, but they don’t need human
help to spread. They’re programmed to move across computer
networks on their own.
 Adware, spyware and ransomware are designed to track
what you do online, gather data about you, and even steal
your data and hold it hostage.
 computer malware
 Web Scripting Virus.
 Boot Sector Virus.

(f) What are the signs that a computer has been infected? State
any five (5). [05 marks]
 Functions slower than normal
 Responds slowly and freezes often
 Restarts itself often
 See uncommon error messages, distorted menus, and dialog
boxes
 Notice applications fail to work correctly
 Fail to print correctly

(g) How can you prevent infections to your computer? State any
five [05 marks] -

 Obtain software only from trusted sources.


 Use a safe Web browser and e-mail client.
 Install anti-virus software, and keep it updated.
 Get trained on your computer's anti-virus software and use
it.
 Scan all newly-obtained disks, programs, and files.
 Install a firewall program, especially if on cable or DSL.
 Have multiple backups of important files
 Install security updates for your operating system and
programs as soon as possible.

You might also like