0% found this document useful (0 votes)
29 views8 pages

Basic Computer Literacy_1

The document outlines the curriculum and examination structure for a computer applications course at the Women's University in Africa, focusing on various aspects of computer literacy and technology. It includes multiple-choice questions on hardware, software, and data management, as well as essay questions addressing computer evolution, data privacy, and network types. The document emphasizes the importance of understanding digital security and the implications of technology in modern society.

Uploaded by

muturumaruva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views8 pages

Basic Computer Literacy_1

The document outlines the curriculum and examination structure for a computer applications course at the Women's University in Africa, focusing on various aspects of computer literacy and technology. It includes multiple-choice questions on hardware, software, and data management, as well as essay questions addressing computer evolution, data privacy, and network types. The document emphasizes the importance of understanding digital security and the implications of technology in modern society.

Uploaded by

muturumaruva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

WOMEN’S UNIVERSITY IN AFRICA

Addressing gender disparity and fostering equity in University Education

FACULTY OF MANAGEMENT AND ENTREPRENEURIAL SCIENCES


FACULTY OF SOCIAL SCIENCES AND GENDER TRANSFORMATIVE
SCIENCES
FACULTY OF AGRICULTURAL, ENVIRONMENTAL AND HEALTH SCIENCES

DIPLOMA IN BUSINESS MANAGEMENT


DIPLOMA IN ENVIRONMENTAL MANAGEMENT
DIPLOMA IN SOCIAL WORK

KBCL111: INTRODUCTION TO COMPUTER APPLICATIONS


BCL111: BASIC COMPUTER LITERACY
KIIT111: INTRODUCTION TO INFORMATION TECHNOLOGY
KPSM114: INFORMATION TECHNOLOGY AND COMPUTER APPLICATIONS

INTAKE: FIRST YEARS FIRST SEMESTER

DATE: TIME: 2 HOURS

INSTRUCTIONS TO CANDIDATES
Answer all questions from Section A and any two questions from Section B.

1
SECTION A

1. Input and Output devices such as monitors and keyboards are classified as
A. arithmetic units
B. control unit devices
C. peripheral devices
D. main store devices

2. A type of software which is used to create slide show is


A. web design software
B. presentation software
C. word-processing software
D. spreadsheet software

3. One MB is equal to:


A. The amount of RAM in every computer
B. 1 billion bytes
C. 1024KB
D. 1 thousand bytes

4. The brain of the computer is called:


A. Random Access Memory
B. Central Processing Unit
C. Read Only Memory
D. BIOS

5. An operating system is:


A. Integrated software
B. CD-ROM software
C. Application software
D. System software

6. The main purpose of RAM is provide a:


A. Permanent storage area for data

2
B. Removable storage medium for permanent data
C. Temporary storage area for instructions and data
D. Transfer of data from computer to screen

7. Which one of the following is an example of mobile technology?


A. Digital camera
B. Laser printer
C. Smart phone
D. Desktop computer

8. Software is:
A. A computer program
B. A set of instructions
C. All of the above
D. Only in operating systems

9. A computer port is used to:


A. Communicate with other computer peripherals
B. Download files from the web
C. Communicate with all hard drives
D. Connect computers together

10. Which one of the following best describes the term hardware?
A. The physical components of a computer system
B. The applications installed
C. The program that controls saving data
D. The parts of a computer system you can touch

11. The resolution of a printer is measured in:


A. Megabits
B. Hz
C. Dots per inch
D. Inches (diagonal)

3
12. Which one of the following is not an operating system?
A. Linux
B. Window 7
C. PowerPoint
D. Mac OS

13. ICT is the acronym for:


A. Internet and Computer Technology
B. Internet and Content Technology
C. Internet and Computer Transfer
D. Information and Communication Technology

14. Backing up of computer data is the process of:


A. Reversing the files stored on the hard drive
B. Putting your computer in the back of the room
C. Storing an extra copy of data on the hard disk
D. Storing an extra copy on an external storage device

15. MS-EXCEL can be used to automate


A. Financial statements, Business forecasting
B. Transaction registers, inventory control
C. Accounts receivable, accounts payable
D. Any of the above

16. You can use the tab key to


A. move a cursor across the screen
B. indent a paragraph
C. move the cursor down the screen
D. A and B only

17. In order to perform a calculation in a spreadsheet, you need to use a:


A. table
B. formula
C. field

4
D. variable

18. Portrait and Landscape are

A. Page Orientation
B. Paper Size
C. Page Layout
D. All of above

19. Which one of the following is an agreement for the end user to accept before using
proprietary software?
A. End-user allowance agreement
B. End-user licence agreement
C. End-user agreement
D. End-user permission

20. Which one of the following may allow malware to enter a computer?
A. Using anti-virus software to scan a computer
B. Scheduling a backup to a remote site
C. Searching for files on the hard drive
D. Downloading software from the Internet

21. The ALU gives the output of the operations and the output is stored in the
A. Registers
B. Flags
C. Memory Devices
D. Output Unit

22. The speed of the CPU is measured in:


A. Megahertz (MHz)
B. Bits per second (Bps)
C. Gigabytes (GB)
D. Megabytes (MB)

5
23. Which of the following would improve computer performance?
A. Using a larger monitor
B. Increasing the number of applications running
C. Using a faster printer
D. Increasing the RAM size

24. If you were working from home, what software application could be used to communicate
directly with colleagues and customers?
A. Presentation
B. Electronic mail (e-mail)
C. Database
D. Spreadsheet

25. Which of the following can be an advantage of electronic documents?


A. They can never be lost
B. They can always be e-mailed regardless of size
C. They can reduce the usage of paper
D. They can never be copied

SECTION B

Question 1
a) Explain each of the following terms with examples:
i. Quad core processor [3 marks]
ii. Display resolution [3 marks]
b) Describe how computers evolved from second to the fifth generation. Your description
should include:
i. Storage devices; [2 marks]
ii. Hardware components; [2 marks]
iii. I/O devices; [3 marks]
iv. Efficiency; and [2 marks]
v. Cost. [2 marks]
b) Enumerate four factors impacting computer performance. [8 marks]

6
Question 2
a) Discuss the implications of the Data Privacy Act for computer scientists and software
developers when creating applications that handle user data. Provide examples to
illustrate your points. [5 marks]
b) Define digital security risks and provide examples of three (3) common threats faced by
individuals and organizations in cyberspace. [4 marks]
c) Explain the significance of digital security and privacy in today's computing landscape.
Provide examples of threats and defenses. [4 marks]
d) Discuss the evolution of computers and communication devices, highlighting their
impact on modern society. [12
marks]

Question 3
Describe the following types of computer networks:
i. LAN; [5 marks]
ii. WAN; [5 marks]
iii. MAN. [5 marks]
iv. PAN; and [5 marks]
v. CAN. [5 marks]

Question 4
a) Describe the different types of input devices. [5 marks]
b) Describe the different types of output devices. [5 marks]
c) Discuss the various types of memory. [5 marks]
a) Differentiate between system software and application software giving examples
[10 marks]

Question 5
b) Define the terms:
i. Internet; and [1 mark]
ii. Virtual Reality. [2 marks]
c) What are security concerns related to IoT. [2 marks]
d) Discuss the uses and benefits of the internet. [20 marks]

7
END

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy