0% found this document useful (0 votes)
60 views5 pages

Computer f1

Uploaded by

joshua
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views5 pages

Computer f1

Uploaded by

joshua
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

MUKAA BOYS’ HIGH SCHOOL

COMPUTER STUDIES, FORM ONE 2024

DECEMBER HOLIDAY ASSIGNMENT

NAME ……………………….……………………………… ADM / NO …….........…

CLASS …………………………………………….......…… DATE ………….........…

OPERATING SYSTEMS

1. The central processor and peripheral devices of a computer system are coordinated by the operating
system.
(a) Define the term ‘Operating system’ (2 marks)
(b) Other than the processor, list two other resources/components that an operating system manages.
(2 marks)
(c) There are several types of operating systems in use today. State two examples of operating
systems with which you are familiar. (2 marks)
2. Explain why Operating systems are so important. (4 marks)
3. Explain any five basic functions of an operating system software. (5 marks)
4. Show the difference between the Control Unit of a processor and the Operating system in terms of
functionality. (2 marks)
5. (a) Explain what is meant by system Interrupt? (1 mark)
(b). Name any five examples of system interrupts and their possible causes. (10 marks)
(c). Mention two advantages of using interrupts for input or output devices. (2 marks)
6. One of the tasks of an operating system is to allow communication between the computer and the
user. State any four system messages from the computer to the operator. (4 marks)
7. (a) Why must an operating system be installed in the computer before installing any other software.
(1 mark)
(b) Differentiate between scheduling and sequencing of tasks by the operating system.
(2 marks)
8. (a) Give three ways in which operating systems are classified. (3 marks)
(b) Giving an example in each case, explain the following types of operating systems:
i) Single-user / Single-tasking (2 marks)
ii) Multi-user / Multi-tasking (2 marks)
9. (a) Give two examples of single-user operating system. (1 mark)
(b) State any three computer software that can be classified as a Multi-user operating system.
(3 marks)
10. A computer user may interact with a computer either through Graphical User Interface (GUI) or
through typed commands.

Page 1 of 5
(a) State two features of a graphical user interface. (2 marks)
(b) Give two advantages of using GUI based operating system over a Command line interface.
(1 mark)
(c) Some computer systems still use Command line interfaces. State two advantages of command
line interface. 2 marks)
11. State three merits of Menu driven interface over a Command based interface. 3 marks)
12. What is a Deadlock in reference to operating systems? (2 marks)
13. Explain briefly the following concepts as used in the Windows environment:
(a) Desktop. (2 marks)
(b) Window. (2 marks)
(c) Icon. (2 marks)
(d) Sidekick menu. (2 marks)
(e) Taskbar. (2 marks)
(f) Task (2 marks)

14. Describe three methods of opening an icon into a window. (3 marks)


15. Distinguish between Operating system software and Utility software. (2 marks)
16. Differentiate between a Toolbar and a Status bar. (2 marks)
17. (a) Identify three functions of each of the following window components: (2 marks)
i) Taskbar.
ii) Title bar.
(b) List and explain down the three parts of the windows Taskbar. 3 marks)
18. (a) Identify three Application software that are installed in your computer. (3 marks)
(b) Give three ways you can start an application in Windows. (3 marks)
19. (a) Explain each of the following commands used to manage files and folders. (5 marks)
i) Rename
ii) Copy
iii) Sort
iv) Properties
v) Delete.
(b). Name the command one would use to repair cross-linked files in Graphical user interface
software. 1 mark)
20. (a) What is disk formatting?
(1 mark)
(b) Why should precautions be taken while formatting diskettes? (1 mark)
21. Differentiate between Hard-sectored and soft-sectored disk. (2 marks)
22. Distinguish between disk compression and disk defragmentation. (2 marks)
23. (a). Define ‘Folder/ directory tree’ (1 mark)
(b). Give two examples of root directories you know. (1 mark)
(c) Give three uses of sub-directories or subfolders. (3 marks)
24. Draw a directory tree showing how files and folders are organized by an operating system.
(5 marks)

Page 2 of 5
25. Identify two factors that you would consider when choosing an operating system for use in a
computer. (2 marks)
26. You are employed in an organization as a computer operator in the Accounts department. The
following are some of the tasks you are supposed to perform:
 Data entry.
 Ensuring that data entered in the computer is stored in a well-organized manner.
 Backing up data.
 Monitoring hard disk space of all computers in the department.
(a) What is used in Microsoft Windows to store programs and files in a well-organized manner?
(1 mark)
(b) Explain two methods of backing up data into a storage device in Windows.
(2 marks)
(c) Identify two reasons why a user needs to know the space available for data storage in the hard
disk. (2 marks)
27. Explain how Windows organizes information in reference to files and folders. (1 mark)
28. Distinguish between System files and Application files. (2 marks)
29. Outline three reasons why it is important to first shut down the computer before turning it off.
(3 marks)
30. Outline the procedure of renaming a file or folder using windows operating system.
(3 marks)
31. Which keys in the keyboard should one press when he/she wants to:
i) Cut
ii) Copy
iii) Paste
iv) Rename an item
32. (a) What is meant by the term ‘disk Partitioning’? (1 mark)
(b) Give two reasons why the hard disk may be partitioned. (2 marks)
33. (a) State two purposes of the Recycle Bin. (2 marks)
(b) Give two advantages of using a password in Windows as an operating system.
(2 marks)
34. A computer specification has the following details:
Pentium III
1.44 MB Floppy disk drive
20 GB Hard disk
Full Multimedia
17” SVGA monitor
Pre-installed Operating system
Pre-installed Office Suite
(a). What is meant by: - (3 marks)
(i). 1.44 MB floppy disk drive.
(ii). 20 GB
(iii). 17” SVGA
(b). Which operating system might be pre-installed in this computer, and why? (2 marks)

35. A school organizes its work in directories. The directory WP contains the files CATS, EXAMS and
ASSIGNMENTS. The directory SP contains the spreadsheet files. The directory DB contains the

Page 3 of 5
database files. The directory PROG is contained in the OTHERS directory. The directory WP also
contains the PERSONAL directory. Given that the directory STUDENT contains directories SP, DB,
WP and OTHERS.
(a). Draw the directory tree structure with C as the root. (7 marks)
(b). Write the path at which the contents of subdirectory DB can be erased or displayed.
(2 marks)
(c). Write the path for the directory PROG. (2 marks)
Give two reasons for storing files in directories and subdirectories. (2 marks)

DATA SECURITY AND DATA INTEGRITY


1. (a) Differentiate between Data Security and Data Integrity. (2 marks)
(b) Give the three types of data that should be protected in a computer. (3 marks)
2. State any three threats to data and information. (3 marks)
3. State five possible ways of preventing data loss from a computer. (5 marks)
4. (a) Define the term Computer crime. (2 marks)
(b) Explain the meaning of each of the following with reference to computer crimes.
i) Tapping
ii) Piracy.
iii) Trespass.
iv) Industrial espionage
v) Data alteration
vi) Fraud
vii) Firewalls
5. Give two reasons that may lead to computer fraud. (2 marks)
6. Outline four ways of preventing piracy with regard to data and information. (4 marks)
7. (a) Differentiate between Hacking and Cracking with reference to computer crimes.
(2 marks)
(b) Describe the following terms with respect to computer security: (6 marks)
(i) Audit trail.
(ii) Data Encryption.
(iii) Log files.
(iv) Firewalls.
(v) Physical security
(vi) Logic bombs.
8. (a) What is a Computer virus? (2 marks)
(b) Outline four symptoms of a virus infection in a computer system. (4 marks)
(b) State two damages which a computer virus may cause to a computer. (2 marks)
(c) Explain three control measures you would take to protect your computers from virus attacks.
(3 marks)
9. List three functions of an antivirus software. (3 marks)
10. Computer systems need maximum security to prevent an unauthorized access. State six precautions
that you would expect an organization to take to prevent illegal access to its computer-based systems.
(6 marks)
11. (i) Explain what is meant by the term “computer security” (2 marks)

Page 4 of 5
(ii) State two environmental factors that can affect operations of a computer. (2 marks)
(iii) State two control techniques or measures that can be implemented to prevent the effect in (i)
above. (2 marks)
12. Explain why the following controls should be implemented for computer based systems.
i) Backups (2 marks)
ii) Air conditioning (2 marks)
iii) Uninterruptible power supply (UPS) (2 marks)
iv) Segregation of duties (2 marks)
v) Passwords (2 marks)
13. Give four rules that must be observed in order to keep within the law when working with data and
information. (4 marks)
14. (a) Define the term Computer ethics. (1 marks)
(b) Give two examples to show how a person who has committed a computer crime can help to improve a
computer system. (2 marks)

Page 5 of 5

You might also like