Click to follow our Afritutor YouTube Channel, subscribe and click notifications and get updates on new learning videos


<=Back

<=CDACC ICT Technician Level 6 : Demonstrate Digital Literacy past paper July 2023

Computing machines can be classified in many ways and these classifications depend on their functions and definitions. Describe THREE types of computers based on their processing power.

    Viewed:  65  times
For Better experience and learning,for video answers, after video ends playing, click next question in the questions list!!!

  Share in:
        

Question Answer:





Questions List:

1. Elisabeth reads an article on common computer terminology. She does not understand the meaning of the operating system. She comes to you for help. How will you explain the term operating system to Elisabeth
2. Mwikali selected a paragraph in word processing. Explain what happened after pressing the following keys on the keyboard a. CTRL + B b. CTRL +A
3. State TWO mouse actions
4. Highlight TWO advantages of previewing a document before printing
5. Outline THREE functions of Operating System in computer System.
6. Veronica tried to retrieve a document file following all the steps correctly. The file did not appear in file directory. State TWO possible causes for this.
7. Small scale and large-scale organizers are turning to the use of in-house developed software for the processing activities rather than buying a. Explain the term in-house developed software b. State TWO reasons that may influence these organizations to make such decision.
8. Outline TWO reasons why it is important to shut down the computer using the correct procedure.
9. Barbara wants to create a newsletter. She needs a program that provides several newsletter templates. Identify the type of program that will meet her needs.
10. Explain TWO characteristics of a computer
11. State TWO reasons as to why the computer is referred to as an electronic device.
12. Highlight FIVE application areas where spreadsheet software can be used
13. Outline FIVE reasons why micro computers are suitable for personal computing
14. Lydia intends to use tab stop feature to align text in a document created using a word processing program. Outline FOUR examples of tab stops she could apply.
15. Innovations in information technology is impacting various fields of society and policy makers are acting on issues involving economic productivity, privacy protection, and affordability of and access to information. Explain TWO ways in which ICT has impacted the following areas of society. i. Education ii. Workplace
16. Figure 1 shows the errors generated when a wrong formula is entered in cell C1 and cell C2 in a worksheet
17. Jacob created slides using a presentation program. Describe FOUR ways he could view the slide
18. The Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection. Based on a recent survey of Internet traffic, internet is widely being used in education institutions, cyber, homes and almost all organizations that have automated their operations. Explain FOUR uses of internet
19. Computing machines can be classified in many ways and these classifications depend on their functions and definitions. Describe THREE types of computers based on their processing power.
20. An Agrovet Company wants to analyze its employee's personal details using Microsoft Excel. The company has five employees: Mary Anne, Francis Kihara, Lena Achieng, Hellen Wanjiku, and Mwangi Peter. Their ages are 20, 45, 90, 45 and 34 years respectively. Mary Anne and Lena Achieng are in Research department; Mwangi Peter and Hellen Wanjiku in Computer department whereas Francis Kihara is in Person
21. Data integrity ensures the correctness and completeness of the data in the database. Explain FOUR types of integrity constraints that could be enforced during the creation of databases.
22. Database security refers to the various measures organizations take to ensure their databases are protected from internal and external threats. Describe FOUR database security best practices that an organization must perform to ensure its data is protected from both internal and external threats.
23. Hacking is the gaining of unauthorized access to data in a computer system data in a computer system. It is a major threat to any business that has automated its operations. Businesses and government corporations are losing a lot of money on a daily basis to hackers. Identify FOUR measures you should undertake to prevent hacking of your online account, phone, tablet or personal computer.
24. Joel was asked to source for an internet service provider to supply his college with internet. Discuss FOUR factors other than cost that he could consider during the selection.
25. Speed and accuracy are some of the advantages of using computers. Explain FOUR other advantages of using computers in banking.
26. Marion has been asked to design wedding cards for her friend using a desktop publication application. Outline FOUR layout guides that she could use while designing the cards.


About Us

Contact us

Terms of use | Privacy policy

Follow Us:               

All Rights Reserved © 2024; pscustudies.com