0% found this document useful (0 votes)
65 views16 pages

WORD PROCESSOR pp2

Uploaded by

maryannej238
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views16 pages

WORD PROCESSOR pp2

Uploaded by

maryannej238
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

WORD PROCESSOR

QUESTION ONE

1. (a) Type the following passage exactly as it appears into a word-processor, spell check and
format it accordingly. Use typeface Times New Romans, font size 12.
Format your document to fit exactly on one page. Save it as NET 1 (26marks)

NETWORKS MODELS
Networks can be organized into three basic models client/server, peer to peer and centralize
computing. Client/Server and peer-to-peer are used with PC networks. While centralized computing
models are used with mid-range and mainframe computers usually running a UNIX-based operating
system. The peer-to-peer model is the simplest to implement and assemble. Client/server is the most
popular configuration, because of its versatility and power drawing mainly from the vast variety
and higher performance of specialized server hardware.

Central computing networks


The host is the core of the centralized computing model. Host computers typically run the UNIX
operating system and can process multiple jobs simultaneously and in a very efficient manner. Jobs
are initiated by the Terminal, which has no processing capability on its own and simply provides
input/output for the host. The user logs into the host computer to process the user’s job; when the
job is finished, the host computer sends the results of the job back to the terminal.

The main advantage of centralized computing is that they are the highest performance networks
today. Its major disadvantages are:
• They are costly
• They are dependent on custom written software
• They are more complicated than PC severs

Client/Server Networks
The client/server network is the workhorse of the network world and consists of at least one server
with shared recourses and one or more clients which users do their work on. The server, often called
the back end, stores and secures users’ files. It provides the single point of administration for
network users, files, and applications. In a client/server network, the function of the server is to
provide services, where as the function of the client is to provide the actual processing. Most
client/server networks are built round a domain structure, where all servers within a given domain
share a common administration scheme.
Peer-to-peer Networks
A peer-to-peer network is simply a group of computers that function as both servers and clients
(share and access resources). In this type of network, a user works on a workstation and actually
shares that workstation’s resources with other workstations.

Disadvantages
• It may be slow
• Lack of a central security administration
• Decentralized administration might be a nightmare.

(b) (i) Bold face and italicize all the occurrences of the words client/server
(ii) Justify and set the left and right indents of the second paragraph at 1 inch.
(ii) Save the document as NET 2 (6mks)
(c) (i) Copy NET 1 passage to a new document
(ii) Present the document into two columns with a line between the columns. Introduce a
column break on the sub heading “Client/Server Networks” so that your second column
begins exactly with that header.
(iii) Save the new document as NET 3 (6mks)
(d) (i) Introduce double space in the last paragraph of NET 2
(ii) Search and replace the word “host” with “main” in the whole passage.
(iii) Save the document as NET 4 (6mks)
(e) (i) Animate the title of the passage of document NI-T4 to have a blinking background.
(ii) Convert the paper orientation to landscape and format your document to fit on one page.
(iii) Save the passage as NET5 (5mks)
(f) Print2.
QUESTION TWO

Type the passage below as it appears using a word processing package and save it as Bono1.
(Settings: Font Arial, font size 12 for all text, margins; top 0.5”, bottom 0.6”, left 1”, right 0.5”,
1st Heading Size 20, 2nd & 3rd Size 14 ). 36mks

WE MUST STRIVE FOR GREAT THINGS IN LIFE


one should leave legacy that speaks for years.
Paul Hewson was in Nairobi recently. That
won’t mean much to you, until I explain that I
was referring to Bono, the world – famous
lead singer of rock band U2 and campaigner
against global poverty. Bono didn’t really
make much noise while in Kenya. He
attended the Nation Media group’s Pan
Africa Media Conference, took H2o, talked to
a couple of journalists and left.

He didn’t do the other things that visiting celebrities


of his stature do when in Africa: adopt a cheetah or a baby hippo, start a school for orphans, shoot
the breeze pointlessly with Emilio and Tinga, utter banalties about the girl child. Bono reserves his
energy for other things.
Popular Media
Bono is not famous just for being a singer. For the past couple of decades he has been one of the
most visible humanitarian activists, using his fame to enlist powerful allies from:
 Government
 Religious institutions
 Philanthropic groups
 Popular media and
 The business world.
He has personally spearheaded the campaign for debt relief for the world’s poorest countries, and
has been a vocal champion for Africa. Not everyone agrees with these efforts. Author Paul Theroux
savaged Bono, Bob Geldof and other celebrity humanitarians, saying that creating “the impression
that Africa is fatally troubled and can be saved only by outside help – not to mention celebrities and
charity concerts – is a destructive and misleading conceit.”

I happen to agree with that


view and have propagated it
in writing for many years. I
don’t think Africa’s
salvation will come from
outsiders, and it certainly
won’t come from endless
handouts and a crippling
dependency culture
On Trivia

What about you? How big is your life? Are you allowing your time on earth to be frittered away on
trivia, or are you going to make a net positive impact on the planet? Are you doing something, anything
bigger than yourself? Are you raising
a child to be a better person than you are? Are running a business or conducting a profession that sets a
standard in good practice? Or are you content to be a small person imprisoned in a small life?
b) i. Copy the paragraph that begins with “He has personally……..” to page 2. (1mk)
ii. Set the paragraph to hanging indent. (1mk)
iii. Change the line spacing of the entire paragraph to double and convert it to landscape.
(4mks)
c). Insert your name and index number as the header left aligned. (1mk)
d). Carry out word count on the document and write on the paper provided the number of:
 Words
 Characters (with spaces)
 Characters (no spaces) (3mks)
e). Paginate the document using page x of y at the top center. (2mks)
f). Save the entire document as Bono2 (1mk)
g). Print document Bono2. (1mk)
QUESTION THREE

Type the following letter as it appears in a word processor. Use the mail merge feature to produce copies of the
same letter to the persons whose details are given below:- (12 mks)

MWANGAZA HIGH SCHOOL


P.O. BOX 4800
ELDORET
8TH JULY, 2010

NAME≥ ADMNO≥
ADDRESS
TOWN
Dear Name

RE: 2009 KCSE RESULTS


I AM Happy to inform you that NOKDEC Examinations are out. Kindly arrange to visit our
school on Date to visit  at 9.00 a.m. In order to know the details. Remember to carry your original
K.C.P.E certificate and Examination register card bearing the index number.

Yours truly,

Headteacher

Data source (List of candidates)


Name Adm. No. Address Town Date of visit
Mark Otieno 8071 P.O Box 24 Sondu 10/08/2010
Kevin Kirui 8089 P.O. Box 172 Kericho 11/08/2010
Benard Soi 8065 P.O. Box 84 Bomet 24/08/2010
Required:-
i) Save main document as Main Doc (1 mk)
ii) Save data source as Data source (1 mk)
iii) Change addresses and reference font size to 14 points. (1 ½ mk)
iv) Underline the reference. (½ mk)
v) Merge the letter onto main document so as to produce copies for all the candidates
and save it as Results 2009 (6 mks)
vi) Print the letter, main Doc, Data source, Results 2009 (3 mks)

QUESTION FOUR

b) Type the following text in a word processing software. (22 mks)


5
INTRODUCTION TO COMPUTERS & OPERATING SYSTEMS.
A computer is a machine or an electronic device that can solve problems by accepting
data, performing certain operations on that data (processing) and presenting the results
of those operations (information)
Basic characteristics that distinguish a computer from other information processing
devices:-
(i) A computer is electronic – That is, all its processing operations are carried out
with electrical signal.
(ii) A computer can store information for future reference. This is done on temporary
basis with memory circuits and permanently with storage devices such as magnetic
disks and tape.
(iii) Computer is programmable – unlike other devices built to perform a single function,
a computer can be instructed or programmed to perform a variety of tasks.

HOW A COMPUTER WORKS.


Connecting the data (raw facts) into information (organized, usable form) is called data processing. Data
get into system by means of an input device e.g. keyboard then the computer performs the necessary
calculations or manipulations on the data and finally the organized information is displayed by an output device
e.g. a monitor.

FUNCTIONS PERFORMED BY A COMPUTER.


Although computers have many applications, they can perform only three basic tasks
(i) Arithmetic functions on numeric data (Adding, subtracting, multiplying and dividing).
(ii) Test relationship between data items (by comparing values).
(iii) Store and retrieve data.

These skills are really no more than people can do, but the computer can accomplish the task more;
- Faster
- Accurately
- Reliably

Required:-
(a) Align the title to the centre and underline it. (1 mk)
(b) Add boarder to the title. (2 mks)
(c) Replace all the Roman Numbers with bullets. (2 mks)
(d) (i) Insert the footer “Computer Assessment Test 2010.” (1 mk)
(ii) Insert the header “Your Name and the Index No.” (1 mk)
(e) Set the spacing to exactly 1.5 (4 mks)
f) Insert Word Art “COMPUTER” and set it to appear behind the text. (5 mks)
(g) Search for words “computer” and replace all with “PC.” (2 mks)
(h) Move paragraph with heading “How a computer operates” to the end of the document.
(i) Set the front style of the document to Aerial black. (3 mks)
(j) Save your work as “computer literacy.” (1 mk)
(k) Print your document. (2 mks)
QUESTION FIVE
(a) Using a word processing package, type the passage below as it appears and save it as
STRESSDOC1 (27mks)
A parent who appreciates by saying, “Well done’ or I’m proud of you’ can leave an indelible mark.
6
There is much more to facing stress in life than the right diet and physical exercises. Indeed, it could be that the
attitude on which your life is founded is the most vital part of the picture.

Take charge of your life


Keeping stress at bay involves treating yourself as someone with a right to life. That will involve a degree of
assertiveness and confrontation. Those very words can conjure up images of a shoot-out at the OK Corral. It
does not have to be that way. There is a world of difference between being assertive and being aggressive.
Sadly, many who need to break out from being always submissive to the expectation and demands of others can
only imagine that the alternative is to be aggressive.

You are submissive when:


- you are not willing or not able to express your feelings, needs, values and personal concerns
- you let others invade personal space and trample on your rights.

You are aggressive when:


- you tend to stomp over other people
- you inflict and impose your views and values on others, expressing your feelings at their
expense.

You are assertive when:


- you say what you want, without overwhelming or abusing other people
- you are clear about your own position and let other people know
- you can accept that others may have views different from your own and may wish to negotiate their
position accordingly.

Assertiveness involves much more than defending your rights. It equally concerns your being prepared to
expect that your own needs be recognized and met. In particular, two key statements typify the maturity of
character that lies behind assertive. These are the conviction that:
(a) I have the right to decide for myself whether or not I am responsible for finding a solution to someone
else’s problem and they have the same right when faced with mine.
(b) I have the right to deal with people without having to make them like me and they have the same right
concerning me.

Few people find that assertiveness comes easily. But the hard work involved in monitoring your personal style
together with some training through a local evening class or appropriate reading pays dividends. This is because
mastering assertiveness leads to:
 better and more honest communication
 giving others greater dignity and respect
 learning to relax and reduce anxiety
 getting more of your needs accepted
 closer interpersonal relationships
 taking responsibility of what happens in your life
 feeling better about yourself
 protection from being taken advantage of by others

(b) (i) Spell check the passage (2mks)


(ii) Indent the first line of the paragraph starting with “Keeping stress at bay…..” (2mks)
7
By 1.2cm (or 0.47”)
(iii) Select the paragraph starting with “Assertiveness involves much more…..” and set the
left and the right margins to 2cm (or 0.79”) and fully justify. Save the changes as STRESSDOC2.
(6mks)
(iv) Insert page numbering at the bottom center of each page (2mks)

(c) (i) Retrieve STRESSDOC1 and covert all the text from the paragraph starting with
“There is much more…”” into two columns of the same width and height. (5mks)
(ii) Change the line spacing for the entire paragraph starting with “There is more to facing
stress….” to 1.5. (2mks)
(iii) Save the changes as STRESSDOC3 (1mk)
(d) Print the documents; STRESSDOC2 ,STRESSDOC3 (3mks)

8
QUESTION SIX

using an appropriate word processing, type the following passage and save it in
diskette as DATA SECURITY (l0marks)

Data security and control


External threats
i. Fire, floods, earthquakes and other natural disasters. These are the potential
threats hut are not the most common external problems,
ii. Theft of equipment-theft of pc's laser printers and even memorychjps after a
Break into a building are very common,
iii. Espionage (intelligence)-information in the wrong hands can do a lot of
damage. Example access to a payroll or accounting information is restricted so
Such information should be shielded away from external and internal spies.
Internal threats
Internal threat would include
i. Hacking
ii. Fraud
iii. Hardware failure
iv. Corruption of databases
Viruses load and run without the user requesting them to run; and cause considerable damage e.g.
i. Modifying other program
ii. Hiding inside other programs with an aim of spreading to other mashine
iii. Destroying data and programs.
It is a computer code which usually designed to carry out two tasks:
i. To replicate itself from one computer system to another.
ii. To locate itself within a computer system in such a way as to make it possible
for it to amend or destroy programs and data files, by interfering with the normal processes of the
operating, system.

Questions
i) Copy the original document (data security) to the next page (2marks)
ii) Format the headings as follows: (6marks)
Font size Font type underline bold

Data security and control 14 Times new Roman Yes Yes

External threats 14 Monotype corsiva None Yes

Internal threats 14 Default Yes No


iii) Change the numbering to bullets; as follows: (2 marks)
Headings bullet

i. External threats >


ii. internal

9
iv) Strike through the word internal threats (2marks)
C). i) Insert the ANY clipart at the bottom center of the document. (3marks)
ii).Create word art as indicated by the symbol. (2marks)

iii) Using auto shape, design a logo as indicated by the symbol. (2marks)

SECURITY

D) Save the document as SECURITY (2marks)


E)i. Copy the original document (data security) to the next page (2marks)
ii. Drop cap the first letter of the document (D) to cover two lines (1mark)
iii. Spell check the whole document. (2marks)
iv. Double space and italics the first paragraph (3marks)
v. Insert a header "computer threat" to appear in every page (2marks)
vi. Number the pages using the format 1, 2, 3.....
F) Save the document as COMPUTER THREAT (2marks)
G) Print the document
i. Data security (1mark)
ii. Security (1mark)
iii. Computer threat (1mark)

10
QUESTION SEVEN
a) using a Word Processor, type the document as it appears and save it as BiogasMain (27marks)
BIOGAS PLANT
1.0 Domestic biogas presentation
1.1 Value chain
1.1.1 General presentation
iogas is a gas produced through the digestion of organic materials in anaerobic conditions by specific bacteria,
called methanogenic bacteria, or methanogens
Biogas is mainly composed of methane (CH4), and is thus a flammable gas. It can therefore be used as a fuel
Bfor heating, cooking and lighting. Biogas can also be used to feed engines to produce electricity. For
information, the following table compares the equivalence between biogas and other possible fuels in terms of
heating value:

2.0 Potential impacts The installation of a biogas lamp can enable


The dissemination of biogas plants has various children to study later in the evening.
environmental, social and economic benefits.

2.1 Environmental impacts


 Reduction of the biomass resource depletion
 Reduction of Green House Gases (GHG)
emissions
2.2 Social Impacts
 Biogas plants help improve beneficiaries’
quality of life by reducing the workload
usually required for typical tasks such as
firewood collection and fire tending.
 Improved gender equality
Women can spend more time on other
activities and on education, hence a
reduction of gender disparities. 2.3 Economic impacts
 Health and sanitation  Economic impacts for beneficiaries
Bio-digesters reduce the pathogen content of By displacing the use of firewood or
organic materials. charcoal, biogas can help to reduce
 Education households’ energy expenses.
3.0 Technologies
3.1 Possible technologies for domestic biogas
The most common technologies for domestic biogas – biogas production at a household scale –
are:
 Plastic Tube Digester or Polyethylene Tube Digester (PTD):
 Plastic tank digester:
 Technologies based on the Fixed Dome model:
 Floating drum digester:

11
Floating drum technology [11][12]

b) i) Use a function to calculate sum of the fuel value in the table (2marks)

ii) Create a pie chart showing Fuel values below the table. Insert an appropriate

title.(5marks)

c) Insert the following

i) Page number at the bottom center of page (1mark)

ii)“Biogas Technology is Eco-friendly” as a footer (1mark)

ii) Your index number, name and school as a header (1mark)

d) Using the marked Headings (1.0….etc) insert TableOf Content (TOC) after the header

“BIOGAS PLANT” (5marks)

e) i) Insert “Biogas Production System” as Diagonal semitransparent watermark(3marks)


ii) Insert Art page border of your choice around the First Page Only (3marks)
f) Print Biogas Main (1marks)

12
Q1. a)Type the following passage exactly as it appears and save it as 21CLD (25 marks)

21st Century Learning Design

Introduction
Students around the world need advanced skills to succeed in the globalised, knowledge-based
world of today. 21st Century Learning Design, or 21CLD, professional
development helps teachers redesign their existing lessons and learning
activities to build students’ 21st century skills.
21CLD online
The 21CLD curriculum - 21CLD research methodology, providing a collaborative,
developed to enhance 21st practice-based process that helps educators transform how
century skills in student they design enriching learning activities for their students.
learning - builds on the
The 21CLD which have been internationally for Teaching and
curriculum is developed and the Innovative Learning (ITL)
based on rubrics, tested

The 21CLD curriculum describes six rubrics. These are:


1. Collaboration 4. Self-regulation
2. Skilled communication 5. Real-world problem-solving and
3. Knowledge construction innovation
6. Use of ICT for learning

21CLD elements
The core elements of the 21CLD curriculum include:
 A focus on redesigning learning to develop 21st century skills and deepen understanding of
21CLD curricular goals.
 Facilitating educators to use new learning designs within their own teaching and to analyse the
impact on student learning.

21CLD course structure

T he 21CLD curriculum consists of the following 8 online courses: The 21CLD introductory
course explains the background to the 21st century skills; The 21CLD rubrici is used to analyse
learning unit examples; The final course brings together all of the 21st century learning design
elements

21CLD OneNote

T his OneNote provides all of the resources and reading materials to accompany
the 21CLD courses. Under each tab, you will find the 21CLD rubrics, decision
trees and anchor lessons used throughout the online course.

i
A rubric for assessment, usually in the form of a matrix or grid, is a tool used to interpret and grade
students' work against criteria and standards.

1
b) Insert a table of contents at the beginning of the document showing the topics covered in the
21CLD course as shown below. Save your work as 21CLD TABLE OF CONTENTS
(3 marks)

Contents
21st Century Learning Design ....................................................................................................................... 1
Introduction ............................................................................................................................................... 1
21CLD online............................................................................................................................................ 1
21CLD elements ................................................................................................................................... 1
21CLD course structure ........................................................................................................................ 1
21CLD OneNote ....................................................................................................................................... 1

c) Assessment was done on the application of the 21CLD and results recorded in a table.
Design the table exactly as it appears. Save your work as RESULTS (5 marks)

AVERAGE
EXAM/100
ADMNO

CAT1/30

CAT2/30
CLASS
NAME

Mercy Jayden 4 Blue 5068 26 13 70


Catherine Johns 4 Yellow 5897 14 10 30
Crystal Evans 4 Purple 5589 19 20 74
GRAND TOTAL
Lowest CAT1
Highest CAT2
Insert a function to display the:
i) AVERAGE for all the students (2 marks)
ii) GRAND TOTAL (1 mark)
iii) Lowest score in CAT1 (1 mark)
iv) The Highest score in CAT2 (1 mark)
d) Insert the following expression (2 marks)
=1+ + + + ⋯ , −∞ < <∞
! ! !
e) Double space the names in the table (2 marks)
f) Search and replace the word “Skills” and replace with “Competence” (2 marks)
g) Insert a header “Competence Based Curriculum” (2 marks)
h) Print the documents on both sides of the paper (4marks)

2
3
4

You might also like