Click to follow our Afritutor YouTube Channel, subscribe and click notifications and get updates on new learning videos


<=Back

<=KNEC Diploma in ICT module 1 Introduction to ICT and Ethics past paper: November 2015

The figure 2 shows a typical network topology. Outline the components labeled (i) and
(ii).
computer-networks-15-5-2022.png

    Viewed:  446  times
For Better experience and learning,for video answers, after video ends playing, click next question in the questions list!!!

  Share in:
        

Question Answer:





Questions List:

1. Explain each of the following terms as used in computers. i)Wikis ii)Blog
2. Sawa Company Ltd. are experiencing internal hacking of their computer system.Outline four possible root causes of the problem.
3. Outline two benefits of embracing ICT in learning
4. Distinguish between stress and fatigue
5. Define the term lease as used in computer acquisition
6. Keziah was selected as chairperson for an ICT committee in her company. Outline four communication skills that she could use during meetings.
7. Outline four types of computer mice
8. Ergonomics awareness education should address all the safety needs of An organization. Outline four objectives of such an awareness initiative.
9. Daisy-Winds Company Ltd. Intends to embrace ergonomics standards in its computer facilities. Outline four benefits that the company could realize from this decision
10. With the aid of diagrams in each case, explain two categories of computer networks based on how information is shared
11. Explain two circumstances that could necessitate the use of hybrid topology in a computer network
12. Differentiate between microcomputer and minicomputer.
13. Figure 1 shows typical port signs that could be found in a computer system. Outline the function of each of the port signs labeled (i) and (ii)
14. Tash was invited to give a lecture on the use of ICT at a conference in a college. Assume she consulted you, outline six qualities of a good public speaker that you could have suggested to her.
15. Salome noted that a good number of her friends were using pirated software. Explain three categories of risks that are likely to affect their computers.
16. Outline three measures that could be used in an organization to mitigate conflict of interest with its staff.
17. Explain three advantages of embracing ICT ethics in organizations.
18. Outline two challenges of computers at home
19. Magnetic disks are popular computer storage medium. Outline three advantages of this storage medium.
20. Norah was required to describe the categories of computer keys in an examination. Describe three categories that she was likely to mention
21. Outline three examples of scanners that can be used with computers
22. Distinguish between RAM and ROM as used in computers
23. Explain three benefits that an organization could realize by embracing green computing.
24. Outline three reasons that could necessitate organizations to initiate social responsibility projects.
25. A lecturer intends to install a computer software. Explain two categories of software that he could install.
26. Explain each of the following types of computers: i)analog; ii)hybrid
27. Differentiate between computer systems implementer and computer systems analyst.
28. With the aid of a diagram, describe the functional components of a system unit.
29. Jorum was seeking advice from his friend on how to manage work conflict. Outline four measures of managing work conflict that he is likely to have been advised.
30. Nancy was required to identify functions of an operating system during a job interview. Outline four functions that she could have identified
31. Explain each of the following terms as used in hardware Acquisition: i) a warranty; ii)interoperability.
32. Figure2 shows a typical network topology. Outline the components labeled (i) and (ii).
33. Paul was required to formulate computer laboratory safety rules. Outline four rules that he was likely to list
34. All computers utilize several types of buses for efficient system Communication. Describe two typical categories of buses found in computers.
35. Polly, an intern student in a certain college was required to install certain software in all computers in the college. Outline four methods of installation that she could have used.
36. List four recordable version of digital versatile disk (DVD) that could be found in computers.
37. Differentiate between preventive and reactive conflict management techniques.
38. Explain two objectives of computer safety policy in organizations.
39. Communication software is considered as a vital tool in business. Outline four Categories of such software that could be found in business firms.
40. Data privacy is critical part of information communication technology. Outline three measures that an organization could use to realize its data privacy standards.
41. Facebook has connected the world as one big community. Outline three negative impacts that are likely to be associated with its adoption by students.


About Us

Contact us

Terms of use | Privacy policy

Follow Us:               

All Rights Reserved © 2024; pscustudies.com