0% found this document useful (0 votes)
59 views2 pages

Computer F.4 March 14

This document is a 2nd Continuous Assessment paper for Computer Studies at Canossa Secondary School, dated March 2014. It includes multiple-choice questions, fill-in-the-blank questions, and short answer sections covering topics such as file extensions, computer security, RAM vs. ROM, operating systems, and the impact of ICT on the environment. The assessment is structured into sections with varying marks allocated for each question.

Uploaded by

Joshua Bachuba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views2 pages

Computer F.4 March 14

This document is a 2nd Continuous Assessment paper for Computer Studies at Canossa Secondary School, dated March 2014. It includes multiple-choice questions, fill-in-the-blank questions, and short answer sections covering topics such as file extensions, computer security, RAM vs. ROM, operating systems, and the impact of ICT on the environment. The assessment is structured into sections with varying marks allocated for each question.

Uploaded by

Joshua Bachuba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd

CANOSSA SECONDARY SCHOOL

2ND CONTINUOUS ASSESSMENT MARCH 2014


COMPUTER STUDIES FORM IV

TIME:1HR NAME……………………………….
…………………………………………………………..…………STREAM…….
SECTION A (10 marks)
1. Choose the best answer among the given alternatives and write its letter in the table
provided
below
i) The file extension for power point presentation is
a) •pow b) •doc c) •xls d) •ppt

ii) ______ is the decrease in magnitude and energy as signal progressively moves
along a transmission medium
a) Base band signal b) Bandwidth c) Attenuation d) Demudulation

iii) _______ is an example of simplex transmission


a) A radio broadcasting b) Computer c) Multiplex link d) Satellite link

iv) ______ is an example of output device


a) Ban code reader b) Plotter c) Touch screen d) Scanner machine

v) ______ is the telecommunication device used to send a document via telephone


lines
a) Facsimile b) Radio c) Teletext d) Video text

vi) ________ is the power point view which display thumb nail of all presentation
slide in their current folder
a) Slide sorter view b) Note page c) Normal view d) print layout
view

vii) Which of the following is odd one out


a) •txt,•doc•,•mdb b) •sysl,• ini, • dll c) • bat, • xls, • htm
d) • doc, • mdb •syst, •ini, • doll

viii) The undo command accomplishes the following


a) Revert to the last action that was cancelled
b) Reverts to the last action that was cancelled
c) Maintains the status quo
d) Cancel the last action

ix) Freezing panes accomplishes the following


a) It makes worksheet to resist any form of scrolling
b) It makes the frozen rows and column to remain visible as other scroll
c) It hide some column in the worksheet which the user does not need
currently
d) Prevent vertical scrolling

x) One of the following formulas is mixed reference done


a) =A1 + B12 b)$CI +$F$ 3 c) =sum (A3:B4) (1mark@)
d) B2 + A13

i ii iii iv v vi vii viii ix x

2. Fill the correct answer in the space provided


i) __________ is the protection of information hardware and software against
computer cringe.
ii) _________ is the protection of private data or information against misuse or
unauthorized access
iii) __________ are mostly former employees of the company or outsider who use
their knowledge to cheat or defraud with intention of acquiring good or service.
iv) ________ is the illegal copying of copy right protected data and information or
software
v) _______ is the special type of virus that does not attached themselves to
program but self replicates hence clogging the machine memory
vi) ________ involve altering or deleting data and information for the purpose of
sabotage
vii) _________ a security buffer or wall between a private network and other network
viii) Two chemicals that cause environment pollution related to the use of computer
related to ICT __________ and ___________
ix) Coding data to be transmitted on a network so that only intended user can read
is referred as __________
x) Software used to access information on the web is referred to as _____________
(2marks@)
SECTION B
3.(a) What is RAM and ROM (02 marks)
(b) Differentiate RAM from ROM (limiting to four points) (04 marks)
(c) State three factors that determine the processing speed of a computer
(03 marks)
4. Differentiate
a) Utility and operating system (02 marks)
b) General and special purpose giving three relevant example for each purpose and
their functions (08 marks)
c) Kernel and shell (01 mark)

5. Classify operating system according to


(a) Number of tasks (05 marks) (b) To the user interface (05 marks)

6. List 4 types of computer in descending order according to the processing power


and physical size, state an application area for each (10 marks)

7. Give short notes of each of the following


i) Virtual or artificial reality (02 marks)
ii) Simulation (02 marks)
iii) Electronic point of sales (02 marks)
iv) Explain how electronic point of sales works an mention /state the device used
(04 marks)
SECTION D: (20 marks)
8. Discuss the impact of ICT on environment

9. Explain the functions of operating system regarding the following guiding point
i) Job scheduling iii) Input/out management
ii) Memory management iv) Security v) Job sequencing

END.

You might also like