0% found this document useful (0 votes)
6 views5 pages

Computer Form Two Term Two Cat 1 - Ms

Uploaded by

donald clifford
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views5 pages

Computer Form Two Term Two Cat 1 - Ms

Uploaded by

donald clifford
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

1.

Payroll Formulas

(a)

(i) Basic pay = Hours worked x Hourly rate.


Formula: Basic pay = Hours_Worked * Hourly_Rate

(ii) Allowances are allocated at 10% of the Basic pay.


Formula: Allowances = 0.1 * Basic_pay

(iii) Gross pay = Basic pay + Allowances.


Formula: Gross_pay = Basic_pay + Allowances

(iv) Tax deduction is calculated at 20% of the Gross pay.


Formula: Tax_deduction = 0.2 * Gross_pay

(v) Net pay = Gross pay – Tax deductions.


Formula: Net_pay = Gross_pay - Tax_deduction

(b)

List four types of information that can be entered into a spreadsheet cell.

1. Text
2. Numbers
3. Formulas
4. Dates

2. Document Formatting

(a)

Document formatting refers to the process of altering the appearance of a document to make it
more visually appealing, organized, and readable.

(b)

Five document formatting features are:

1. Font styles (e.g., bold, italic, underline)


2. Alignment (e.g., left, center, right)
3. Bulleted or numbered lists
4. Paragraph spacing and indentation
5. Page layout (e.g., margins, orientation)

(c)
Superscript: Raises the font size and positions the text above the baseline. Subscript: Reduces the
font size and positions the text below the baseline.

(d)

One function of Drop Cap in a document is to enhance its visual appeal by enlarging the initial
letter of a paragraph and positioning it at the beginning, often spanning multiple lines.

3. Keyboard Shortcuts and Word Processor Features

(a)

(i) CTRL + A: Selects all text/content. (ii) CTRL + B: Bolds selected text. (iii) CTRL + I:
Italicizes selected text. (iv) CTRL + U: Underlines selected text.

(b)

(a) Find and Replace: Allows users to search for specific text and replace it with another
specified text. (b) Undo and Redo: Reverses or reapplies the most recent action performed in the
document. (c) Thesaurus: Provides synonyms and antonyms for selected words. (d) AutoCorrect:
Automatically corrects common spelling and typing errors as you type.

(c)

Bolding text emphasizes it by making it appear thicker and darker, while highlighting text
applies a background color to the selected text to make it stand out visually.

4. Directory Structure

(a)

[Image of Directory Tree Structure]

(b)

Path for erasing or displaying contents of subdirectory DB: C:\STUDENT\DB

(c)

Path for directory PROG: C:\STUDENT\WP\OTHERS\PROG

(d)

Two reasons for storing files in directories and subdirectories:

1. Organizational structure: Helps in arranging files systematically for easy retrieval and
management.
2. Prevents clutter: Keeps related files grouped together, reducing clutter and confusion.

5. Computer System Specifications

(a)

Three input devices:

1. Keyboard
2. Mouse
3. Joystick

(b)

(i) 800 MHz: Refers to the clock speed of the processor, indicating its processing speed. (ii) 640
MB of RAM: Indicates the amount of random access memory available for processing data. (iii)
120 GB hard disk: Specifies the storage capacity of the hard disk in gigabytes.

(c)

(i) Spreadsheets package is used for calculations and drawing graphs. (ii) Word processor
package is used for writing essays.

(d)

(i) Sound card and speakers. (ii) Joystick.

6. Computer Safety Measures

(a)

Five measures meant to protect users:

1. Use strong, unique passwords.


2. Install and regularly update antivirus software.
3. Be cautious of phishing scams and suspicious links.
4. Regularly backup important data.
5. Educate users about safe internet and computing practices.

(b)

Five measures meant to protect computer hardware and software:

1. Use surge protectors and uninterruptible power supplies (UPS).


2. Install firewalls to monitor and control network traffic.
3. Keep software updated with the latest security patches.
4. Implement access controls and user permissions.
5. Encrypt sensitive data to prevent unauthorized access.

7. Computer Virus

(a)

A computer virus is a malicious program designed to replicate itself and infect computer
systems, often causing damage to files and disrupting normal operations.

(b)

Four symptoms of a virus infection:

1. Slow computer performance.


2. Unexpected pop-up messages.
3. Files or programs suddenly disappearing or becoming corrupted.
4. Unusual network activity or unauthorized access attempts.

(c)

Two damages caused by computer viruses:

1. Data loss or corruption.


2. System instability or malfunction.

(d)

Two control measures against virus attacks:

1. Install and regularly update antivirus software.


2. Exercise caution when downloading files or clicking on links from unknown sources.

8. Internet Dissemination

(a)

Four advantages of using the Internet to disseminate information:

1. Wide reach: Information can be accessed globally, reaching a larger audience.


2. Cost-effectiveness: Compared to traditional methods like printing, distributing
information online is often cheaper.
3. Timeliness: Information can be disseminated instantly, without delays associated with
physical distribution.
4. Interactivity: Internet platforms allow for feedback, comments, and engagement with the
audience.

(b)
Two examples of email software:

1. Microsoft Outlook
2. Gmail

You might also like