Click to follow our Afritutor YouTube Channel, subscribe and click notifications and get updates on new learning videos


<=Back

<=KNEC Craft Certificate in ICT Module 1:Introduction to ICT November 2015 Past Paper

State two ways of minimizing piracy of computer software

    Viewed:  477  times
For Better experience and learning,for video answers, after video ends playing, click next question in the questions list!!!

  Share in:
        

Question Answer:





Questions List:

1. Define the term firmware as used in computer systems
2. Outline two reasons why computer users generate backup files
3. State two features of the first generation computers
4. Joan discovered that her computer could not boot even though the power connectivity was right. Explain what could have been the cause of this
5. Differentiate between real-time and batch data processing modes.
6. Outline two advantages of each of the following data transmission media a) Coaxial cables b) twisted pair cables
7. James intends to buy a flatbed scanner for office use. Outline two functions that the scanner could be used for
8. Explain the term assembly language as used in computer systems
9. Describe direct file organization method as used in computer data storage.
10. Explain the term data encryption as used in computer security
11. Outline two advantages of magnetic ink character reader (MICR) as used in ICT
12. State two ways of minimizing piracy of computer software
13. Explain two methods that computer operator would apply to improve ergonomics on a computer being used in an office environment
14. Jerry prefers an LCD monitor to a CRT monitor. Explain two justifications for preference.
15. Explain the function of each of the following computer keyboard keys i)print screen ii) Esc
16. Describe computer output to microfilm (COM) as used in computer systems
17. Explain three factors to be considered when purchasing computer hardware, other that cost
18. Dan intends to install utility software in his home computer for domestic use. Explain three utilities he could install
19. With the aid of an example in each case, outline three functions of spreadsheet computer software
20. A computer consulting company intends to educate the public on various forms of computer crimes. Explain three forms of such crimes
21. With the aid of a block diagram, explain the functional components of a computer system.
22. With the aid of a block diagram, explain the functional components of a computer system.
23. With the aid of a diagram, describe the star net topology
24. A secondary school intends to buy computers for its management staff. Explain two uses that the computers could be put into
25. Explain each of the following file management functions of an operating system i)file dumping ii) file loading iii) file deletion
26. Explain the difference between desktop and palmtop computers
27. Distinguish between indexed sequential and sequential file organization methods
28. A company has supplied the following software to a college for use. Novel, Ms Power Point, Unix, Ms Access, Windows for Workgroup. Classify the above software either as; the operating system, presentation software or database management system.
29. Explain the relationship between each of the following data storage units byte and bit kilobyte and gigabyte
30. Outline functions of the primary storage of a computer system
31. The use of ICT technology for money transfer has changed the way in which Kenyans do business. Explain two benefits to business people for using this service
32. Explain one circumstances under which a wireless mouse would be necessity as an input device
33. A computer laboratory requires some standards measures to be followed to ensure a safety and security. Outline four such measures.
34. A large retail shop has installed a computer network for its operations. Explain three benefits that the shop will gain with this move.


About Us

Contact us

Terms of use | Privacy policy

Follow Us:               

All Rights Reserved © 2024; pscustudies.com