Cappsiha 2017 SUB-ICT 1 Marking Guide
Cappsiha 2017 SUB-ICT 1 Marking Guide
1
1. (a) Differentiate between internet and World Wide Web?
(1Marks)
(b) Explain any four requirements for one to connect to the internet.
(4 Marks)
i. Blower
ii. Brush
iii. Software CDs
iv. Overhead fun/ air conditioners
v. Protective covers
vi. Soap
vii. Water
viii. Wipers
i. Describe the steps one would take when saving a presentation file with file
name PAUL in a folder created on the desktop. (5 Marks)
i. First click on the office button/ file
ii. Select “save As”
iii. From the dialog box enter file name as PAUL
iv. Then select the location as desktop, then select the
folder or click on new folder to create it.
v. Then select open and finally click on “save”
2
ii. (a) What do you understand by the term “removable storage”?
(1Marks)
Disadvantages (2Marks)
i. They transfer viruses from one computer to another
ii. They can easily be lost.
iii. They are expensive to buy and maintain
iv. Some may not easily be repaired once spoilt
iii. a. Briefly describe one way how ICT can be applied in each of the following
areas. (2 Marks)
i. Education:
3
b) Explain the following terms related to file transfer. (2 marks)
i. Copy
This is where part of a file is saved on the computer’s
clipboard and it can be pasted / replicated to another
location, leaving the original file in its location
ii. Move
b) Write the names of the following gadgets used in ICT (03 marks)
5. Given the types of software in a table below and different tasks they can
accomplish fill in the gaps. (5 marks)
Task Type of software that can be used
4
Presenting information in a
conference Presentation software like Ms-
power point.
Preparing budgets and other Ms-Excel
calculations
Web browsers like internet
explorer
Reading information on the internet
Adobe Photoshop.
Photo editing
(b). Explain two factors that leads to a slow down of the internet speed.
(2Marks)
5
(b). state the function of each of the following in the process of establishing
a network. (2 marks)
c) State any two software programs used for getting rid of the viruses. (2 marks)
i. avast
ii. Avira
iii. Norton
iv. Dr. Solomon
v. AVG
vi. Kaspersky
vii. Smadv
viii. Panda cloud
ix. McAfee
x. Comodo
xi. PC tools antivirus
xii. Clamwin free
xiii. Malware bytes
xiv. Microsoft security essentials
6
11. (a). Differentiate between hardcopy and softcopy (2 marks)
Scanner
12. (a). Distinguish between worm booting and cold booting? (2 marks)
(b). Describe three situations which may require a computer user to perform a
worm boot. (3 marks)
13. Sserubaale wants to start up his computer from the wall socket. Describe
the step-by-step process His computer will take in order to show up the desktop.
(5 marks)
7
iv.If no problem, it loads the operating system into the main
memory.
v. It finally displays the screen and icons ie an interface between
the user and the computer, ready for Sserubaale to use it.
14. (a) Give any two examples of database management programs. (2 marks)
i.
There is reduction of data redundancy
ii.
There is enhancement of data integrity
iii.
The program has data dependence
iv.
There is improved data access
v.
There is a reduction of costs through reduction in data
duplication
vi. Easy to store
vii. Saves desk and shelf space
viii. Eases sharing of data
15. Describe any two circumstances under which computers can be harmful to a
human being. (2 marks)
i.
Prolonged use of computers may lead to fatigue
ii.
The light from computer monitors harm the eyes
iii.
The electromagnetic waves from the computers are sources of
cancer
iv. Some people have become computer addicts and are mentally
ill
v. Watching pornography
vi. Family neglect due to social media
vii. Wastage of time
(b). Give three advantages of using computers rather than relying on nurses only
in a hospital. (3 marks)
8
16. List down three advantages and two disadvantages of using
electronic spreadsheets.
Advantages (3 marks)
i. It is easy to make changes in data in a spreadsheet
ii. The rest of the work in the cells is recalculated on auto filling
iii. Operation is very fast due to the use of inbuilt functions and macros
iv. Calculations are always accurate given correct data and formulae
v. The data in the charts is automatically updated on update of the
data
Disadvantages (2 marks)
i. Primary key:
This is a unique identifier of elements in a database
ii. Record:
This is a single row representing a single entry in a database.
(b). Give any two reasons as to why a company which has adapted to an
electronic database management system should continue keeping the manual
filling system. (2 marks)
9
18. Define the following terms as applied in ICT. (3 marks)
i. Hacking:
This is the intelligent illegal access of some ones computer system or
website after modifying the access rights or password or codes
ii. Cracking:
This is the act of illegally entering into some ones computer system
by removing the password or this is the act of breaking using
gueswork
(b). Give any two ways of preventing software piracy in developing countries like
Uganda. (2 marks)
i. Use of code key
ii. Use of license keys
iii. Enforcing copyright laws
iv. prosecute the pirates
19. (a). Computer software can be classified into two major classes. Briefly
describe them. (2 marks)
10
x. Provides a means to establish web connections and some
include a web browser and e-mail program.
xi. Responsible for administering security where administrators
establish user accounts that require a user name and password
to access a computer system.
xii. Responsible for managing and moni toring directories and files
stored and the disks.
20. List any five advantages of a monitor over a printer. (5 marks)
11