0% found this document useful (0 votes)
23 views8 pages

KBCL111-Basic Computer Literacy Main Paper - Dec 2022

The document outlines the programs and courses offered by the Women's University in Africa, focusing on gender equity in university education. It includes various degree programs in management, social sciences, agriculture, and education. Additionally, it provides a sample examination paper for a Basic Computer Literacy course, detailing instructions and questions for candidates.

Uploaded by

muturumaruva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views8 pages

KBCL111-Basic Computer Literacy Main Paper - Dec 2022

The document outlines the programs and courses offered by the Women's University in Africa, focusing on gender equity in university education. It includes various degree programs in management, social sciences, agriculture, and education. Additionally, it provides a sample examination paper for a Basic Computer Literacy course, detailing instructions and questions for candidates.

Uploaded by

muturumaruva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

WOMEN’S UNIVERSITY IN AFRICA

Addressing gender disparity and fostering equity in University Education

FACULTY OF MANAGEMENT AND ENTREPRENEURIAL SCIENCES


FACULTY OF SOCIAL SCIENCES AND GENDER TRANSFORMATIVE SCIENCES
FACULTY OF AGRICULTURE

BSc HONOURS DEGREE IN MANAGEMENT AND ENTREPRENEURIAL


DEVELOPMENT STUDIES
BSc AGRICULTURE HONOURS DEGREE IN ANIMAL SCIENCE
BSc AGRICULTURE HONOURS DEGREE IN AGRIBUSINESS MANAGEMENT
BSc AGRICULTURE HONOURS DEGREE IN HORTICULTURE
BSc HONOURS DEGREE IN SOCIOLOGY AND DEVELOPMENT STUDIES
BSc HONOURS DEGREE IN PSYCHOLOGY
BSc HONOURS DEGREE IN WOMEN’S AND GENDER STUDIES
BACHELOR OF EDUCTION DEGREE (PRIMARY)
BACHELOR OF EDUCTION DEGREE IN EARLY CHILDHOOD DEVELOPMENT
EXECUTIVE DIPLOMA IN MANAGEMENT
DIPLOMA IN ENVIRONMENTAL MANAGEMENT
DIPLOMA IN SOCIAL WORK

MAIN PAPER

KBCL 111: BASIC COMPUTER LITERACY

INTAKES: FIRST YEARS, FIRST SEMESTER

DATE: NOVEMBER 2022 TIME: 3 HOURS

INSTRUCTIONS TO CANDIDATES
Answer all questions from Section A and any three questions from Section B.
SECTION A:
1. Stored instructions and data in digital computers consists of
A. alphabets
B. numerals
C. scripts
D. bits

2. Which of the following determines the size of the program which can be run on a
computer system?
A. Speed of the processor
B. Size of the hard disk
C. Size of RAM
D. All of the above

3. In a spreadsheet the type of data that goes into cells is……………….


A. Text
B. Number
C. Formula
D. All of the above

4. The software generally used for what-if analysis is related to:


A. word-processing
B. graphics
C. database management
D. None of the above

5. One row from a table in a relational database is


A. Character
B. Field
C. Record
D. File
6. Which of the following is not used as secondary storage?
A. semiconductor memory
B. magnetic disks
C. magnetic drums
D. magnetic tapes

7. The ALU of a computer contains a number of high speed storage elements called
A. semiconductor memory
B. registers
C. hard disk
D. magnetic disk

8. Storage and retrieval is a key function of :


A. Desktop publishing
B. Database management
C. Documentation
D. Graphics

9. A printer that forms characters by physically striking the paper:


A. Laser
B. Ink jet
C. Non-impact
D. Impact

10. The linking of computers with a communication system is called


A. networking
B. pairing
C. interfacing
D. assembling
11. A graphics output device:
A. Plotter
B. Trackball
C. Light pen
D. Digitizer

12. The use of computer work stations to send and receive messages is known as
A. electronic funds transfer
B. electronic message switching
C. electronic mail
D. electronic publishing

13. Protecting the data from unauthorized access is called


A. data inaccessibility
B. data encryption
C. data security
D. data validity

14. Modern computers do not work with decimal numbers. Instead, they process binary
because
A. electronic devices are most reliable when designed for two state (binary) operations
B. binary circuits are simple
C. memory is only possible for binary numbers
D. with decimal numbers, the circuits are complex and costly

15. Binary coded decimal (BCD) numbers express each decimal digital as
A. binary digits
B. digits and strings
C. nibble
D. word
16. Integrated circuits are classified according to the:
A. no. of chips
B. no. of vacuum tube
C. no. of gates
D. no. of transistor

17. Which is not used to express memory capacity?


A. DB
B. MB
C. GB
D. KB

18. The arranging of data in a logical sequence is called:


A. Sorting
B. Classifying
C. Reproducing
D. Summarizing

19. If you want to improve the performance of your PC, you need to upgrade the
A. CPU
B. Monitor
C. Keyboard
D. Printer

20. The output quality of a printer is measured by


A. Dot per sq. inch
B. Dot per inch
C. Dots printed per unit time
D. All of the above
21. A high quality CAD system uses the following for printing drawing and graphs:
A. Dot matrix printer
B. Digital plotter
C. Line printer
D. All of the above

22. Regarding a VDU, Which statement is more correct?


A. It is an output device
B. It is an input device
C. It is a peripheral device
D. It is hardware item

23. The purpose of software in a computer:


A. Enhances the capabilities of the hardware machine
B. Increase the speed of CPU
C. Both of above
D. None of above

24. 14. The Zebra stripped identifier on a store product:


A. Key
B. Bar code
C. Magnetic tape
D. Wand

25. A legend with respect to a spreadsheet is………………….


A. A heading to a graph
B. A key to a graph
C. A bar chart
D. Any chart
SECTION B:
QUESTION 1

a) State and explain any five functions of the operating system [10 marks]

b) Explain the following giving an example of each

i. Secondary storage [5 marks]

ii. Primary storage [5 marks]

c) What factors should be taken into consideration when buying a software package such
Microsoft Office [5 marks]

QUESTION 2
a) Describe the following input devices and state the appropriate application of each:
i. MICR [3 marks]
ii. Light Pen [3 marks]
iii. Keyboard [3 marks]
iv. Touch Sensitive Screen [3 marks]
v. Bar Code Reader [3 marks]

b) Using a diagram describe the activities involved in the data processing cycle [10 marks]

QUESTION 3

a) Explain the following modes of communication giving an example of where the mode is
appropriately used:
i. Simplex transmission [4 marks]
ii. Half duplex transmission [4 marks]
iii. Full duplex transmission [4 marks]
b) Highlight the following ways of transmitting data
i. Asynchronous transmission [4 marks]
ii. Synchronous transmission [4 marks]
c) List any five symptoms of a computer virus [5 marks]

QUESTION 4

a) Computers can affect the health of users’. Give and explain any five known side effects of
computers on users [10 marks]

b) Computer and data security is an area that demands heavy investment of financial and at times
human resources. Give five measures that can be taken to ensure that computer and data security
is maintained. [15 marks]

QUESTION 5

a) Explain any five factors that are likely to influence the data processing methods to be adopted

by an organization [10 marks]

b) What are the roles of the following IT personnel in an organization of your choice?
i. System Analyst [5 marks]
ii. Computer programmer [5 marks]
iii. Database administrator [5 marks]

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy