Form-2-Comp - Opening MS
Form-2-Comp - Opening MS
15. Differentiate between analogue data and digital data as used in computer.
Analogue Data Digital Data
3
(Award 2-mark max 2)
16.
(i) Define the following terms.
(a) Deadlock
Deadlock is a situation where a set of processes are blocked because each process is
holding a resource and waiting for another resource acquired by some other
process.
(Award 1 mark max 1)
(b) Interrupt
It is a break from normal sequential execution.
(c) Kernel
This the core of the operating system which is responsible for managing computer
resources.
(Award 1 mark max 1)
(ii) A student saved his practical work in a computer during thelesson. At the end of the lesson, he was
requested by the teacher to delete the file unfortunately the student forgot the file name. Mention three
attributes that this student may use to locate this fileto delete it from the computer.
File extension
Date of creation
File size
(Award 1 mark each max 3)
(iii) Describe four ways employed by the operating system to protect its data and programs.
Use of password and usernames to authenticate users this will only allow users
with correct credentials to access the files.
Modern operating systems support biometric technology. This makes good use of
human attribute like fingerprints, Voice, image, and Irish for user identification.
4
Some operating systems also allow the use of patterns. Users who draw the
correct patterns gain access to the files those with the wrong patterns are denied
access.
Backup facility. The operating system has mechanism of creating backups which can
be used to reconstruct the files.
Recovery and restore features.
(Award 1 mark each max 4)
(iv) Mention three functions of the recycle bin.
Temporally delete files from a storage location
Restore deleted files.
Permanently delete files from the computer
(Award 1 mark each max 3)
(ii) Describe two ways of discharging static electricity that might have built up on the hands during basic
computer setup and cabling.
Touch earthed objects
Use antistatic Wrest member.
(Award 1 mark each max 2)
(iii) Mention four reasons to justify why solid-state storage devices are gaining popularity in modern computing.
Mass storage
Ease of installation since most of them are plug and play.
Fast
Portability
Energy efficient
Not prone to mechanical failures
(Award 1 mark each max 4)
(iv) Give a reason in each case to justify why the following rules must be observed when handling magnetic
storage media.
(i) Do not expose a magnetic media to strong magnetic field.
5
This would disorient the magnetic dipoles causing erasure of recorded data.
(Award 2 marks max 2)
(v) List three interfaces that can be used to link a printer and a computer.
Parallel cables
Serial cable
Network cables
USB
Bluetooth
(Award 1 mark each max 3)
18.
(i) Describe five functions of an operating system.
Error handling the operating system perform error check on both the hardware and
software and suggest the solutions to the problem.
Memory management the operating system divides memory into blocks and decide
on what to be placed in memory at any given time.
Interrupt handling the operating system study the cause of the interrupt then
transfer control to the most appropriate program.
Job scheduling the operating system give each task a fraction of the processor
time then it will supervise how these tasks are processed one by one.
Security operating system have several mechanisms of protecting data and
programs such as password, backup etc.
(Award 1 mark each max 5)
(ii) State three advantages of command line operating system
Execute extremely fast.
Require less memory.
Can work with monitors with low resolutions.
(Award 1 mark each max 3)
(iii) List two items used to measure software Authenticity.
Availability of certificate of Authenticity
Software License
Product key
(Award 1 mark each max 3)
(iv) Distinguish between Multitasking operating system and multiuser operating system.
6
Multitasking operating system execute more than one program apparently at the
same time while multiuser operating system allows more than one user to
interactively user the computer.
(Award 2 marks max 2)
(v) During a computer lesson a student switched on the computer but the computer failed to display the active
GUI window instead it displayed an error message Corrupted System Registry.Mention three ways ofsolving
thiserror.
Repair the registry using emergency repair disk.
Restore the registry backup.
Reinstall the operating system.
(Award 1 mark each max 3)
19.
(i) What is hot swapping?
Hot swapping is the replacement or addition of components to a computer system
without stopping, shutting down, or rebooting the system.
(Award 2-mark max 2)
(ii) Identify the type of peripheral interfacing cables shown in the table below.
NAME
HDMI cable
NAME
USB cable
NAME
SATA cable
7
(iii) State the difference between COM port and LPTport.
COM port also known as a serial port transmits data bit by bit LTP port also
known as a parallel port transmits multiple bits simultaneously at a time.
(Award 2 marks max 2)
(iv) Mention devices that can be connected to the computer by the following cables.
(a) VGA
Monitor
Projector
(b) SCIS
Hard disk
(c) PS/2
Mouse
Keyboard
(Award 1 mark each max 3)
(v) Explain master slave configuration as used in hard disk setup and configuration.
This is a concept used in setting hard drive on an EIDE controller that support up
to two drives on a single ribbon where master drive is the main drive where the
operating system resides while the slave is additional storage location.
(Award 2marks max 2)
(vi) Kim connected new multimedia speaker to his computer and tried to play his favoritemusic from a memory
card, but no sound was heard. Give three main causes of this problem.
Lack of the sound card
Music files not supported.
Multimedia speaker not properly connected.
Missing music files from the memory card
Memory card not properly inserted.
(Award 1 mark each max 3)
20.
(a) Describe three items that a good warranty must cover.
Scope of coverage. This is how long the warranty agreement is supposed to last
(The period for the warranty)
Callout response and liability agreement. For example, how long should the supplier
take to repair a fault or replace the product, and if he/she delays who bears the
cost.
Preventive Maintenance for example regularity of service, at intervals etc.
(Award 1 mark each max 3)
(c) King James bought two computers for his office use the first computer was valued @34000 while the second
one was valued @50000. Suggest three reasons that might have made the second computer to be more
expensive (3marks)
The second computer may have a superior processing capability.
The second computer may be small in size therefore easy to carry from one place
to another.
The second computer was a branded computer.
(Award 1 mark each max 3)
(d) Explain the following factors must be considered when purchasing a computer software (
(i) Reliability
Consider buying a software that will function without crashing or hanging.
(ii) Portability
A portable software is one that can be copied from one computer to another with
ease.
(iii) Compatibility
Purchase a software that will work in harmony with the existing hardware and
software.
(iv) User friendliness
Consider software that will take the user a shorter time to learn and use.
(e) Mention three features that a computer must have to support multimedia capability fully.
Sound card
Speakers
Multimedia software
Webcam/camera
9
DVD drive
SVGA monitor
(Award 1 mark each max 3)
10