Topical Revision Guide For Sub-Ict and Computer Studies
Topical Revision Guide For Sub-Ict and Computer Studies
Topical Revision Guide For Sub-Ict and Computer Studies
GUIDE TO THE TOPICAL QUESTIONS FOR BOTH SUB-ICT AND COMPUTER STUDIES PAPER 1
INTRODUCTION TO COMPUTING
2) a) Define the following terminologies in relation to computing giving two examples where necessary.
i) Data: is defined as raw facts and figures that have less meaning to the end user. E.g. a letter (a, b, c),
students’ marks, Musical notes. Employee salary.
ii) Information: is a processed data which is meaning full to the end user. E.g. a word (love, honey), students’
report, a Song, Employee pay roll.
iii) Data processing: means transforming the raw facts (data) into information.
iv) Information processing cycle: is the sequence of transforming the raw facts (data) into information which
involves input, processing, output, and storage activities.
b) Using a diagram, illustrate the Information Processing Cycle giving one device applied at each stage.
[email protected]
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
INPUT
Keyboard,
mouse,
microphone,
digital camera
etc.
PROCESS
Processor
OUTPUT
Monitor,
projector,
printer, plotter
etc.
STORAGE
[email protected]
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
3) a) Write short notes on the following devices and personalities in relation to history and evolution of computers.
(For O’level Only)
i) Abacus: This is the first manual calculating device used to perform basic arithmetic operations.
ii) John Napier: He invented Napier’s bones that was used to multiply, divide and calculate square and cube
roots.
iii) William Oughtred: He invented the Slide rule basing on Napier's logarithms. It is used primarily for
multiplication, division, roots, logarithms, Trigonometry.
iv) Blaise Pascal: He invented Pascal’s Calculator and its limitations were addition and subtraction.
v) Gottfried Wilhelm Leibniz: He invented Stepped Reckoner/ Leibniz Calculator. He just improved Pascal’s
Machine. Leibniz calculator could do addition and subtraction which was a limitation to Pascal’s calculator.
vi) Joseph-Marie Jacquard: He invented the Jacquard weaving Loom machine that was used to control the
weaving process when making complex patterns.
vii) Thomas de Colmar: He discovered the Arithmometer and this was first mechanical calculator.
viii)Charles Babbage: He invented the Difference Engine and Analytical Engine. He is considered as the father of
computers.
ix) Lady Ada Lovelace: She developed the Binary Number System for Babbage’s machine. She is considered as
the First Computer Programmer.
x) Per Georg Scheutz: He invented Scheutzian Calculation Engine basing on Charles Babbage's difference
engine. It was the first printing calculator.
xi) Herman Hollerith: He invented the Tabulating Machine that was used by the USA government in 1890
population census.
xii) Howard H. Aiken: He invented Havard Mark 1. It was the first electromechanical computer.
xiii)Konrad Zuse: He invented Z1. This was the first programmable computer.
xiv)Professor John Atanasoff: He invented Atanasoff-Berry Computer (ABC). It was the first electronic digital
computing device.
2
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
ii) Health/Hospitals
Lab-diagnostic System
Patient Monitoring System
Pharmacy Information System
Clinical image processing
iii) Finance/Banks
Internet banking/online banking/e-banking
Automated Teller Machines (ATM)
Information systems audit
Mobile Banking
iv) Defence/Security/Police/Military
Military aptitude
Military secrecy
Guidance system
Research and detective work Computer aided flight
v) Communication
Internet telephony (VoIP)
Video Conferencing
E-mail
Chatting
Computer assisted speech
vi) Entertainment
Music
Television and movies
3
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
Games
Sports
vii) Homes
Home budgets
Online shopping
Online banking
Chatting/instant messaging
Entertainment
b) State three instances in which Information Technology has rendered people jobless in today‟s society.
In Education through online lessons and Computer Based Training.
In Banks through ATM’s
In marketing through online adverts and social media.
In industries through Robotic technology.
7) With examples, state the major categories of computers in each of the following computer classifications.
(For O’level Only)
i) Classification by process
Analog computer: is a computer that uses continuous physical phenomena such as electrical, mechanical or
hydraulic quantities to model the problem being solved. E.g. speedometer, pressure gauge, tire pressure gauge
etc.
Digital computer: is a computer that performs calculations and logical operations with quantities represented
as digits, usually in binary number system (0s and 1s). E.g. calculators, digital thermometers, digital watches etc.
Hybrid computer: is a computer that processes both analog and digital data. E.g. Computers used in hospitals
to measure the heartbeat of patients, Devices used in petrol pump, Hybrid Machines used in controlling industrial
processes.
b) List four measures taken to ensure that computers in a laboratory are safe.
The computers should be properly switched on or off.
Install and update antivirus.
Lock the laboratory after use of computers.
Use burglar proofing.
Setup lightening arrestors to guard against thunder.
Keep fire extinguishers to guard against fires.
5
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
The computers should be connected to the UPS or stabilizer to avoid short circuits and loss of data.
Keep the computers in a dust free environment.
Foods and drinks should not be allowed in the computer laboratory.
Computers should be allowed to cool down before covering them.
Use firm tables to hold the weight of hardware.
Avoid illegal connections and disconnections.
Avoid exposing computers to heat/direct sunlight
e) Develop a check list of four practical computer laboratory rules and regulations for your school.
No eating from the computer lab.
No fighting in the computer lab.
Computers must be safely shut down and covered after use.
No deletion of files one did not create.
No personal passwords are allowed.
Movement of devices is prohibited.
Users must report faults as identified.
All repairs and services are done by the technical department.
No watching of pornography or any form of controversial content.
All external storage media like flash discs must scanned first before use.
Use of computers for external work must be with permission.
7
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
FILE MANAGEMENT
c) Write the acronym pdf in full. Give reasons why it‟s used in file management.
pdf stands for Portable Data Format
COMPUTER HARDWARE
1) Computer hardware describes the physical components of a computer. Basically there are four major categories
namely; Input Hardware, Output Hardware, Storage Hardware and Processing Hardware. Given the following
hardware devices.
Monitor, Flash Memory, Keyboard, Projector, Processor/CPU, Trackball, Interactive White Board, Optical Scanner,
Mouse, Plotter, Touch Pad, Touchscreen, Magnetic Tape, Printer, Optical Mark Recognition (OMR) Reader, Fax
Machine, Magnetic Stripe Reader, Magnetic Tape, Optical Character Recognition (OCR) Reader, Optical Discs,
Barcode Reader, Floppy Disc, QR (Quick Response) Code Reader, Large Format Printer, Zip Disc, Light Pen, Head
Phones, Terminal, Magnetic Ink Character Recognition (MICR) Reader, Jaz Disc, Multifunction Device, Dictaphone.
b) In the above list, select five devices that can be used to both input data and output information.
Interactive White Board
Touchscreen
Fax Machine
Terminal
Multi-Function Device
c) Give the function and application area for each of the following devices.
i) OMR: is a device that reads pencil marks and convert them into computer usable form before entering them
into the computer. It’s Used read questionnaires, multiple choice examination papers.
ii) OCR: is a device that enables a computer to recognize written or printed characters. It is used in utility bills
and price tags on departmental store merchandise.
iii) MICR: is a device used to read the special magnetic ink that banks use to print details on the bottom of
cheques. It is used to process cheques in banking operations.
iv) Barcode Reader: is a hand-held input device used to capture and read information contained in a barcode. It
is used in supermarkets, book shops, medical stores and departmental stores.
2) a) Outline the two major classification of printers giving three examples of printers under each.
Impact Printers: are printers that produce a hard copy output with the print heads physically touching the print
media.
Examples of Impact printers: Dot matrix printer, Daisy wheel printer. Line printer.
Non-Impact Printer:are printers that produce a hard copy output without the print head touching the P.media.
10
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
Examples of non-impact printer are: LaserJet printer, Inkjet printer, Thermal printer.
b) Give three merits and demerits of each of the above mentioned printer classification.
Impact Printers
Merits/Advantages Demerits/Disadvantages
They are relatively cheap They are generally noisy
They can withstand dirty environment They are relatively slow
They can make multiple copies with multipart paper They produce a poor quality output.
Non-Impact Printers
Merits/Advantages Demerits/Disadvantages
They are generally quiet during printing. They are very expensive to buy.
They are relatively fast during printing. There are high maintenance costs.
They produce high quality output.
4) a) Define the following terms as used in computer storage. Give examples where necessary.
i) Storage medium: refers to the physical equipment that stores data or information. Examples of storage media;
Compact Disc, Hard Disc, Floppy Disc, Magnetic Tape etc.
ii) Storage device: is a device that records and retrieves data or information to and from a storage medium.
Examples of storage devices; DVD/CD Drive, Hard Disc Drive, Floppy Disc Drive, Magnetic Tape Drive etc.
iii) Memory: is a temporary area for holding data, instructions, and information.
iv) Reading: is the process of transferring data, instructions, and information from a storage medium into
memory.
v) Writing: is the process of transferring data, instructions, and information from memory to a storage medium.
vi) Access time: is the amount of time it takes a storage device to locate an item on a medium.
vii) Spooling: is the process of putting tasks that need to be done into a buffer until they can be executed.
b) Distinguish between
i) Sequential Access and Random Access methods of accessing data on storage media.
11
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
In Sequential Access, records are stored one after the other and, in order to access a record, the computer has
to go through all the previous records while in Random Access, records are also stored one after the other but
each record can be accessed directly.
5) a) Define a CPU.
A CPU is the electronic device that interprets and carries out the instructions that tell the computer how
to work.
c) Outline the three major components of the CPU giving the function of each.
Control unit (CU): controls the operations of all parts of the computer.
Arithmetic Logical Unit (ALU): performs the arithmetic, comparison, and logical operations.
Registers: are high speed temporary memory locations for holding data and instructions.
iv) Ports
Serial Port: connects older computer mouse and external modem to the computer.
Parallel Port: connect older printers to the computer.
Universal Serial Bus (USB) Port: can connect up to 127 different USB peripheral devices with a single
connector type, greatly simplifying the process of attaching.
VGA (Video Graphics Array) Port: connects monitor or projector to a computer's video card.
PS/2 Port: Used for old computer keyboard and mouse.
Fire wire Port: Connects camcorders and video equipment to the computer.
Ethernet Port: Connects to a network and high speed Internet.
8) a) Define a bus.
A bus is a common pathway through which information flows from one computer component to another.
b) Write short notes on the following bus types.
i) Control bus: is used to control signal generated by CPU to different part of the system.
13
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
ii) Data bus: is used to transfer the data between main memory and CPU.
iii) Address bus: is used to access a particular memory location by putting the address of the memory location.
COMPUTER SOFTWARE
c) Computer software is broadly categorized into two namely; System and Application software. Briefly explain each
category.
System software: is a collection of programs designed to operate, control, and extend the processing
capabilities of the computer.
Application software: is a collection of programs designed to satisfy a particular need of a particular
environment.
14
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
File compression utility reduces on the size of the file thereby creating more space on a disc.
Sorting utility re-arranges data in any order specified by the user.
c) Explain the three major categories of Operating system giving three examples in each.
Stand-alone Operating System: is a complete operating system that works on a personal computer (PC). E.g.
Mac OS, UNIX, Linux, MS-DOS, Windows XP, Windows Vista, Windows 7, Windows 8, Windows 10 etc.
Network Operating System (NOS): is an operating system that support a network and typically resides on the
server. E.g. Windows Server 2003, 2008, Solaris, Novel Netware, UNIX Server, Linux Server etc.
Embedded Operating System: is an operating system that resides on ROM chips and typically used in handheld
computers and small devices. E.g. Windows Embedded CE, Windows Mobile, Android OS, Palm OS,
Embedded Linux and Symbian OS.
15
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
d) In each type of interface, outline three operating system that provide such interface.
Examples of Operating System that provide CLI
UNIX
Linux
DOS
b) Apart from the ISP, outline four requirements for accessing the internet.
NIC (Network Interface Card)
Modem
A computer or any other device like a phone
Browser
An Operating System
c) List four ISP in Uganda.
MTN
Airtel
Africel
Vodafone
UTL
K2 Telecom
d) State four roles of ISP.
Provide internet access to the user.
Provides internet services like email.
Act as a mediator between the user and internet.
Provide technical support to users.
16
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
Demerits/Disadvantages
There is a lot of wrong information on the internet.
There are predators that hang out on the internet waiting to get unsuspecting people in dangerous
situations.
Some people are getting addicted to the internet and thus causing problems with their interactions of
friends and loved ones.
Pornography that can get in the hands of young children too easily.
Easy to waste a lot of time on the internet.
There are a lot of unscrupulous businesses that have sprung up on the internet to take advantage of
people.
Hackers can create viruses that can get into your personal computer and ruin valuable data.
Hackers can use the internet for identity theft.
17
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
iii) Newsgroups (discussion group): is an online area where users conduct written discussions about a particular
subject.
iv) Message boards (discussion board): is a Web-based type of discussion group that does not require a
newsreader program.
v) Internet Relay Chat (IRC): is a real-time conference system that discusses/chats on specific topics that suits
your interest using text messages.
vi) Internet telephony: is a Web-based telephone service that allows a user to talk to others for just the cost of
the Internet connection.
vii) Chat rooms: is a location on an Internet server that permits users to chat with each other.
viii)Instant messaging: is a real-time communications service that notifies a user when one or more people are
online and then allows the user to exchange messages or files with them.
ix) Telnet: is an internet service that allows a user to log onto a remote device.
x) Videoconferencing: is a meeting between two or more geographically separated people who use a network
or the Internet to transmit audio and video data.
c) Below is a snapshot of an email window. Study it carefully and answer the questions that follow.
Have an appropriate subject as this encourages the recipient to open and read the message.
Do not Spam that is mass electronic mailing for the purpose of advertising.
Do not forward angry messages.
Read your mails on a daily basis so as to respond to your recipients when it is still appropriate.
Merits/Advantages Demerits/Disadvantages
Data can be accessed from anywhere provided It requires strong internet connection.
you have internet connection.
Data can be shared easily. There is need for training in managing cloud
storage.
It provides a quick recovery of data. Users have no full control over their data.
Automatic data backup can be scheduled. It is costly for smaller companies.
2) a) Explain the following transmission modes giving two application areas for each:
i) Simplex: communication occurs only in one direction. Application areas; Television broadcast, Radio
broadcast, Keyboard transmission, Pagers, Temperature sensors, Doorbell etc.
ii) Half duplex: communication occurs in both direction BUT one at a time. Application areas; Radio call, Fax
machines, Credit card verification systems, Automated teller machines etc.
iii) Duplex: communication occurs in both direction at the same time. Application areas; regular telephone line,
Computers etc.
b) State the difference between following types of transmission giving one application area for each.
i) Serial transmission and parallel transmission.
In Serial Transmission, data is sent bit by bit while in Parallel Transmission, various bits are sent together at
the same time.
Application area
Serial Transmission: Used for long distance communication. E.g. Computer to computer.
Parallel Transmission: Used for Short distance communication. E.g. computer to printer.
In Asynchronous Transmission, data is sent 1 byte or a character at a time while in Synchronous transmission,
data is sent in blocks.
Examples of Asynchronous Transmission: Letters, emails, forums, televisions and radios.
Examples of Synchronous Transmission: Chat Rooms, Video Conferencing, telephonic conversations, as
well as face to face interactions etc.
3) a) The term Computer Network can be defined as the interconnection of computers for the purpose of communication
and resource sharing.
a) Outline four resources that can be shared on a network.
Software
Modems
Printers
Storage devices
Fax machines
Communication links
Computer Network
Merits/Advantages Demerits/Disadvantages
Facilitates hardware sharing, many users share Buying the computer cable and servers is very
one printer. expensive.
Facilitates data sharing, data can be shared Viruses are easily spread to other computers on
through Emails, VoIP, Video conferencing etc. a computer network.
22
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
In a peer-to-peer network, each computer on a network acts as a server for the files stored upon it while in
client-server network, there is only one computer called the server that supplies resources or responds to
requests from other computers called the clients.
There is no need for full-time Network Administrator It is difficult to administer since the whole system is
since users can control their data. decentralized.
The over-all cost of setting up this network is Data recovery or backup is very difficult since each
relatively low since, there is no need to buy an computer must have its own back-up system.
expensive server.
It is more reliable since if one computer fails to work It does not run efficient if you have many computers.
all the other computers connected to it still continue
to work.
Client-Server Network
Merits/Advantages Demerits/Disadvantages
It is easy to Backup data and administer security Its startup cost is high since you have to buy server
since the whole system is centralized. computer which are very expensive.
Data is organized since it can be accessed from one There is a reliance on the central server, if it fails, no
point (servers) and this provides greater security work can be done.
controls than most clients. A network administrator is required and this costs
money.
There is lots of network traffic.
IRC (Internet Relay Chat): used for Internet chat and other communications.
TFTP (Trivial File Transfer Protocol): used for connectionless active file transfer.
SLIP (Serial line internet protocol): is an encapsulation of the Internet Protocol designed to work over serial ports
and modem connections.
DHCP (Dynamic Host Configuration Protocol): used for providing IP address automatically to client computer
through DHCP server.
DNS (Domain Name System): translates network address (such as IP addresses) into terms understood by
humans (such as Domain Names) and vice-versa.
WAP (Wireless Application Protocol): is a technical standard for accessing information over a mobile wireless
network.
PPP (Point-to-Point Protocol): is a protocol used to establish communication between two computers using a
serial interface.
XMTP (Extended Mail Transfer Protocol): used when any file or document is attached with an e- mail message.
SNMP (Simple Network Management Protocol): used to manage Network devices on IP networks for example
routers, switches, servers, workstations, printers, modem racks etc.
Star topology: all nodes are individually connected to a central connection point, like a hub or a switch.
Ring topology: all the devices are connected to one another in a shape of a closed loop.
25
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
Tree/ Hierarchical Topology: is a hybrid topology. Groups of star-configured networks are connected to a linear
bus back-bone.
Mesh Topology, devices are connected with many redundant interconnections between network nodes. In a true
mesh topology every node has a connection to every other node in the network.
26
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
Computer Viruses
Having many peripherals being plugged in
d) Assuming that one of your friends has bought a computer set with the specifications below. As a student of computer
studies/ICT help your friend to understand these specifications as you answer the questions that follow;
SPECIFICATIONS
Intel(R) Core (TM) 2.40 GHz.
1GB of SDRAM.
250GB HDD.
Super Multi DVD-ROM.
10/100 Base-T Network Interface and 56 Modem
Intel(R) HD Graphics. 1280 x 800 (64 bit) LCD Display.
Lenovo model 25184HU.
Windows 8 Ultimate 64-bit.
System architecture 64 bit.
Norton Internet Security (3 years subscription), Microsoft Works (OEM), NTI CD-Maker Gold (OEM), Adobe Acrobat
Reader 9, Microsoft Office 2013 Home and Student Edition.
i) State this computer’s processing speed.
2.40 GHz
ii) Describe what the DVD-ROM will enable him to do.
It will help him read and write data on both CDs and DVDs.
iii) Provide evidence for this computer‟s connectivity ability to a network.
The presence of a 10/100 Base-T Network Interface and 56 Modem.
iv) What does LCD and HD stand for in full?
LCD: Liquid Crystal Display
28
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
b) Broadly, programming language are categorized into two; Low Level Programming Language and High Level
Programming Language. State;
i) Two examples of programming language in each category.
29
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
High-level language programs are easy to Require more memory than the low level
debug. languages.
They are flexible hence they enhance the
creativity of the programmer, increasing
productivity.
3) a) Outline three;
i) Importance of programming.
Programming meets the increasing demand for computer programs.
Programming provides a better understanding of how computers work.
It helps develop thinking skills.
Computer programming is a well-paying job.
It is rewarding to see your ideas come out to life as a program.
30
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
#include<stdio.h>
int main ()
{
float π, radius, area;
printf ("Enter the value for the radius\n");
scanf ("%f", &radius);
π=3.14;
31
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
area=π*radius*radius;
printf ("The area of the Circle is:%.2f\n",area);
return 0;
}
Start
Enter raduis
area=π*radius*radius
area
Stop
c) For each of the above risks, give one measure that can be undertaken to avert/stop the risk.
Computer viruses
The latest and updated version of Anti-Virus should be installed on the computer.
USB drives should be scanned for viruses before opening them.
32
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
Junk or unknown emails should not be opened and must be deleted straightaway. Unauthorized or
pirated software should not be installed on the computer.
More secure operating systems such as LINUX, Ubuntu, Windows 10 etc. should be installed.
Install security updates for your operating system and programs as soon as possible.
If computers are connected to a network, firewall should be activated to block all unauthorized access
by intruders with bad intensions to a network resources.
Information theft
Implement access control to computers and networks like use of passwords.
Use encryption techniques.
Create backups in locations away from the main computing center.
Reinforce weak access points like windows, doors and roofing.
Employ guards to keep watch over data and information centers and backups.
Software theft
Keep original software boxes and media in a secure location.
Schedule regular software audits to guard against piracy.
Set installation passwords that deter illegal installation of software.
Use licenses and certificates to identify originals.
Enact laws that protect the owners of data and information against piracy
Make software cheap enough to increase affordability.
System failure
Install surge protectors to protect computer equipment against voltage spikes.
Regularly replace aging components before they completely stop working.
Regularly update all software on the computer.
Install lightening conductors or arresters to protect computer hardware from lightning strikes.
33
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
Differential backup: copies only the files that have changed since the last full backup.
Incremental backup: copies only the files that have changed since the last full or last differential backup.
34
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
To encourage creativity through ensuring that creative people receive the financial benefits of their work.
To allow payment of damages to the copyright owner.
b) State and explain the stages or phases of the Systems Development Life Cycle.
Planning or Feasibility Study: define the problem and scope of existing system.
Analysis and Specification: Gather, analyze, and validate the information.
System Design: Includes the design of application, network, databases and user interfaces.
Implementation: Implement the design into source code through coding.
Maintenance/Support: Implement the changes that software might undergo over a period of time, or implement
any new requirements after the software is deployed at the customer location.
36
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
d) Give any four merits of using electronic processors over ordinary type writers.
Typing using word processor is easier and faster because some actions are automated e.g. word wrap.
Word processor has editing tools such as spell and grammar check hence no mistakes.
Word processor produces neat and attractive work.
Word processor has formatting features to make the document look more attractive and readable
With Word processor many copies can be printed per session.
Convenient to create form letters and mailing labels.
i) Editing a document.
Thesaurus: is an editing tool that helps the user find words or phrases with similar or opposite meaning.
Find and replace: is the feature that allows you to direct the word processor to search for a particular word or
phrase and then direct it still to replace the found word or phrase with another word everywhere it appears in
your document.
Autocorrect: is the feature that automatically detects and fixes the transposed letters of a word or capitalized
words.
Auto complete: is the feature that displays a complete word when the user types first few characters of the
word.
Spelling and grammar: is the feature that checks on the spelling and grammar of the text in the document.
Delete: is used to erase the selected text.
Cut: enables you to completely move the selected text to a new location using the paste option.
Copy: enables you to duplicate the selected text to new location leaving the original file or folder
Paste: enables you to transfer the cut or copied content from the clipboard to a new location.
ELECTRONIC SPREADSHEETS
39
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
40
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
iii) Operator and operand: an operator is symbol that specifies the type of calculation you want to perform on the
arguments of a formula while an operand is a quantity upon which a mathematical operation is performed.
E.g. 2*3, 2 and 3 are operands, * is an operator.
b) Outline three;
i) Statistical operators used in spreadsheets.
MAX
COUNTA
AVERAGE
MIN
COUNTIF
COUNTBLANK
COUNT
RANK
6) The table below shows a worksheet which Robert was working on. Use it to answer the questions that follow.
41
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
vi) Write formula you would use to computer the fees balance. Use absolute cell reference.
=$D$8-C3
PRESENTATION SOFTWARE
DATABASES
1) a) Define a;
i) Database: is an organized collection of related data.
ii) Database Management System (DBMS): is the application software used for managing data stored in
databases.
b) Outline four examples of Database Management Systems.
Microsoft Access
Corel paradox
Oracle
DBIII
Sybase
DBIV
SQL server
Clipper
Informix
Microsoft Fox Pro
Lotus approach
43
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
d) Give four advantages of using Database Management System over manual databases.
Little space is required to store the database
Sorting and updating data can easily be done with Database Management System
There are fewer updating errors since the data is centralized
There is cost reduction on data entry and storage
It’s easier to limit access to the database since security is centralized
ii) Form
It is used to enter data and navigate data into the table.
It is also used for calculation.
iii) Query
It is used to find particular information from a table.
It is used to search on several fields
It is used to sort the results in the order of your choice.
It is used for to perform calculations on the data.
iv) Report
Gives a summary of information designed for a printout.
4) a) Distinguish between;
i) Text and Memo data types: Text data type is used on fields where the field size of data entered is less or equal
to 255 characters while Memo data type is used on fields where the field size of data entered is above 255
characters.
ii) Relational database and flat file database: a relational database is a database with more than one table while a flat
file database is a database with one table.
iii) Microsoft Access and a database: Microsoft Access is an application program used to create and manage
databases while a database is an organized collection of related data.
iv) Validation rule and validation text: a validation rule is a logic expression that restricts entries in the field while
validation text is the message that appears when the validation rule is violated.
5) The table below was extracted from a database of Makerere High School Migadde. Use it to answer the questions that
follow.
a) Identify the;
i) Table name. CANDIDATES TABLE
ii) Key field in the table. Employee No
iii) Number of records in the table. 8 records
iv) Number of fields in the table. 8 fields
v) The sixth field name. MEMBERSHIP FEE (Shs)
b) State the most appropriate data type for;
i) Employee No: Auto Number
ii) Last Name: Text
iii) Membership No: Number
45
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
d) Write the criteria or criterion to be used in the query design view to return;
i) Candidates first name starting with letters “Nakk”.
Like "nakk*"
ii) Candidate born between 1990 and 2003.
Between #31/12/1990# And #01/01/2003#
iii) Candidates with Membership No below or equal 400.
<=400
iv) Candidate (s) with Last Name ending with “ine” and “ria” that paid fully.
Type: Like "*ine" Or Like "*ria" (Under Last Name field) and also type: Yes (Under the Fully Paid field)
v) Candidates‟ AGE.
AGE: DateDiff("yyyy",[DOB],Now())
47
Compiled by Tr. Atim Abel Atim (0787826150, 0707369775)
Provide motivation/ reward for students: posting the students‟ excellent work on the website is a great way to
praise them and their works.
Keep parents well-informed: everything parents need to know is available on an effective website – activities,
recognitions, announcements, etc.
Communication: the school can reach out to a wider audience worldwide like students recruitment.
Provide educational support: students can get tutorial lessons through podcast and other useful materials.
Teacher collaboration: it can provide a forum for teachers to collaborate with other teachers worldwide as a
community of practice.
Collaboration and networking: it can provide a forum for students and teachers to collaborate with the outside
world.
Advertisement: it can provide general information about the school.
Publishing: it can enable both students and teachers publish their work.
NOTE
Endeavor to read this handout before you sit mocks and
final UCE & UACE Exams.
Good luck
Compiled by:
ATIM ABEL ATIM
Contact: 0787826150/0707369775
Email: [email protected]
@ ST.LAWRENCE ACADEMY, SCHOOLS
AND COLLEGES
END
48