Click to follow our Afritutor YouTube Channel, subscribe and click notifications and get updates on new learning videos


<=Back

<=KNEC Craft Certificate in ICT Module 1:Introduction to ICT November 2021 Past Paper

Outline four methods that can be used to secure data in a computer system

    Viewed:  503  times
For Better experience and learning,for video answers, after video ends playing, click next question in the questions list!!!

  Share in:
        

Question Answer:





Questions List:

1. Outline two characteristics of the following types of computer monitors. i)Cathode-ray tube ii)Flat-panel display
2. Describe each of the following types of computers i)Analogue ii)Hybrid.
3. Explain two circumstances that would lead an organization to secure their electronic data
4. A college intends to adopt computerized data processing in its operations. Describe two modes of processing that the college would consider
5. Tiffany, a student, has been using a flash disk to store her project work. Describe two benefits that she is likely to realize from using this device.
6. Dan, a computer user, has been experiencing wrist pains. Explain two precautions he could take to prevent such pains
7. Describe each of the following factors to consider when selecting a computer hardware: i)Compatibility ii)Expandability:
8. Distinguish between optical marker reader (OMR) and optical character reader (OCR).
9. Diana created a master file on her new computer. Describe two types of files she could have used to create this file
10. Outline four methods that can be used to secure data in a computer system
11. Outline three features of mainframe computer
12. Mary copyrighted a new book she has published for sale. Explain three benefits she is likely to realize from copyrighting
13. Cloud Company has adopted the use of green computing technology. Explain three features of this technology
14. Explain three negative effects of information communication technology to a college student
15. Distinguish between CD-RW and CD-R as used in computers
16. Sisi Company uses random file access method. Explain three advantages of this method.
17. Explain two uses of computers for defense
18. Harry bought a wireless mouse for use in his office computer. i)Describe this device. ii)Outline three disadvantages of this device
19. Outline four application areas of computers in agriculture
20. Bei Bora supermarket uses a point of sale return terminal (POS) to service its customers. Describe two keying in devices that the supermarket could use
21. Explain two reasons for the preference of a star topology configuration.
22. A technician installed a network operating system to an institute’s computers. Outline three features of this software
23. Outline three types of utility programs used in computers
24. John used shielded twisted pair cable in a computer network. Explain three advantages of using cable
25. Pauline would like to buy a user friendly software for her company. Describe three characteristics of such software.


About Us

Contact us

Terms of use | Privacy policy

Follow Us:               

All Rights Reserved © 2024; pscustudies.com