Preventive maintenance measures in computer room do not include
One example of web design package is
Shared-memory is an architecture in
The following statements are steps used in creating a new workbook in a Microsoft Excel application.
I. Click on New
II. Click on the Microsoft Office button
III. Choose blank document Which of the following arrangements shows the correct order of operation from the steps above?
The database tool that allows the user to select and filter data from multiple tables is referred to as
A student was given an assignment which involved typesetting a passage at home using a laptop computer. The student was required to bring the soft copy of the assignment in a flash drive with volume label STUDENT ASSIGNMENT to the school. Highlight the steps the student would take to: (a) save the typeset work in the flash drive (b) create a folder named ASSIGNMENTS on the desktop of computer in the school’s computer laboratory and save the typeset assignment in the folder (c) prit the assignment from the folder created in 5(b).
A certain business center provides computer and internet services to the public. The owner is concerned that there is no restraint on consumption of food and drinks by the customers and also about possible health hazards to the computer users.
(a) Give two safety precautions that must be put in place to protect the workstations in the business center from foods and drinks.
Precautions I:
Precautions II:
(b) State two ways the computers can be maintained to ensure efficiency in serving the customer.
Maintenance I:
Maintenance II:
(c)(i) Name three possible health risks to the customers while using the computers in the center.
Risk I:
Risk II:
Risk III:
(ii) How can the risks in 4(c)(i) be reduced?
Solution I:
Solution II:
Solution III:
(a) (i) State three ways of classifying computers.
(ii) Differentiate between digital and analog computers.
(b) List three positive impacts of ICT on the society.
(c) Give two types of information transmission medium.
(a) Complete Table 1 wih the appropriate criteria for each medium.
Table 1
Criteria/Medium | DVD-ROM | Hard Disk | Magnetic Tape |
Location of storage media | External | (i) _________ _________ |
(ii) __________ __________ |
Removability | (iii) __________ __________ |
(iv) __________ ___________ |
(v) ___________ ____________ |
Method file Access | (vi) __________ __________ |
Random/Direct Access | (vii) ___________ ___________ |
(b) List three examples of spreadsheet application.
(a) Define the following terms; (i) Disk formatting (ii) Data backup (iii) Virus scan
(b) State four uses of the Automated Teller Machine (ATM)
Which of the following terms is not a feature of distributed database?
To prevent the loss of data in the computer, it is better to implement file
The following media are used for information transmission except
A file organization that contains a reference number is called
The best arrangement that gives the correct order of magnitude of the database element is
The function of the SQL statement SELECT Student ID, Surname, House Name FROM Student, is that it
One advantage of information processing is that
The malware which is programmed to initiate at a specific date or when a specific event occurs is called
A system analyst is a person who
Security breaches in computing cannot be prevented through the use of
One safety measure to consider in a computer room is