ICT Revision Questions
ICT Revision Questions
(a) Which of the two computers would you recommend for your company to buy?
(03marks)
Computer Y
(b) State two reasons to defend your answer in (a)
(i) has higher processor speed
(ii) Has bigger ram
(iii) has a bigger storage space
(c) Which is the least important computer specification given in the table? (01mark)
Monitor size
(d) State one reason defending your answer in (c) (01mark)
Just an output devices
2. (a) Explain how computers can professionally be used by:
(i) Teachers (02mark)
- to prepare notes
- to prepare presentations
- to show presentation
- teach ICT
- to search for information
(ii) Doctors (02 mark)
- To communicate to fellow doctor
- To search for drug and disease information
- To store patients health information
1 digitalteachers.co.ug
(b) State one health risk associated with continued usage of computers (01 mark)
- Muscle and joint pain
- Overuse injuries of the shoulder, arm, wrist, or hand
- Eye strain
- Backache
4. (a) A student had a file on her laptop and wanted to transfer it to a computer in a laboratory.
Give three devices that she can use to transfer the file (03marks)
- USB flash drive/external hard drive
- Direct USB cable transfer
- cloud storage service
- Network transfer (LAN or WiFi)
- SATA cable connection
(b) Explain the following methods of transferring a file from one location to another. (02
marks)
(i) Drag (01mark)
"Drag" means placing the cursor over the icon of an item, pressing the left (or sometimes right)
mouse button to highlight it, and while keeping the button depressed, moving the selected
item across the screen and drop it to another location.
(ii) copy (01 mark)
Is duplicating a file and then paste a copy in another location
5. (a) Give three factors a company should consider before buying any storage devices.
2 digitalteachers.co.ug
(b) Teo’s network access speed is six megabytes per second. How many kilobytes does
Teo’s network receive or send per second? (02 marks)
6. (a) Give one use for each of the following computer devices (02 marks)
- Operating system manages hardware, software resources, and provides common services for
computer programs.
- Drivers allow operating system to communicate with hardware devices like printer, graphic
cards, network adapters etc.
- Utility software performs maintenance tasks such as disk cleanup, antivirus scanning and file
management to ensure the system runs smoothly.
- Firmware is low-level software embedded in hardware devices, providing control and
communication between the devices and other system components.
- Boot loaders are responsible for loading operating system into computer’s memory when the
system is powered on
- Language processors/translators translate high-level programming languages into machine
codes that the computer can execute.
- Resource allocation is system software that allocate resources like CPU time, memory space
and input/output devices to various programs and users
3 digitalteachers.co.ug
- Security and Access control ensures that unauthorized user do not access the system and that
data is protected from corruption and loss.
- Communication Software: Communication software allows us to transfer data and programs
from one computer system to another.
(b) Differentiate between a software version and a release (02marks)
A software version is software distributed but differs from other/earlier forms of similar
software in some rfeatures and identified by a unique set of numbers and letters.
A software release is the distribution of the final version or the newest version of a software
application.
8. (a) State two internet tools that support web based research. (02marks)
- Todoist:
- EndNote:
- EduGeeksClub
- Zotero
- RefWorks
(b) Identity three things one would require in order to get connected to the internet (03
marks)
- Device: A computer, smartphone, tablet, or any internet-capable device.
- Internet Service Provider (ISP): A company that provides internet access.
- Modem: This device connects to your ISP and brings the internet into your home.
- Router: If you want to connect multiple devices or use Wi-Fi, you’ll need a router. Some
modems come with built-in routers, known as gateways.
- Connection Type: Depending on your ISP, you might use DSL, cable, fiber, satellite or cellular
data
- Cables and Power Supply: Ethernet cables to connect your modem and router, and power
cables for both devices.
9. Outline five factors which determine data transmission speeds over the internet (05marks)
- Network congestion
- Network latency
- Bandwidth
- Type of connection i.e. using cables or wireless
- Effectiveness of hardware and software resources
- Load balancing
10. (a) Give five factors an organization should consider before choosing a Local Area Network.
(05marks)
- geographic and physical location
- bandwidth /the amount of information can handle at a given time
- network security
4 digitalteachers.co.ug
- scalability: a network that accommodate more users, business applications, new location,
etc. is preferred
- IT maintenance costs
- Initial costs.
11. (a) Write the initial procedure of booting a computer system (03marks)
(b) Give any two measures taken to ensure that computers in the laboratory are safe
(02marks)
- Minimize rodents from computer room by not eating or drinking from within
- Keep an authorized persons out of the laboratory
- Lock the laboratory in the absence of a laboratory supervisor
- Employ a security guard
- Use antivirus software
- Passwords to computer files
- Computer laboratories should be clean and organized to avoid accident
12. (a) A computer file is made up of a file name and a file extension.
- It identifies the type of file e.g. .docx is a document type of Microsoft word
- Helps the operating system to open/edit the file with the correct software thus
preventing errors
- Helps the user to identity a potentially dangerous files such as executable files(.exe)
which may contain malware
(ii) Write down the file extension for a word processing document. (01 mark)
.docx
(b) Okello deleted his file accidentally. In which two ways can he recover his file (02 marks)
5 digitalteachers.co.ug
13. (a) An Internet café plans to replace Cathode Ray Tube (CRT) monitors with Liquid
Crystal Display (LCD) monitors. Why should the café replace CRTs with LCDs? (05
marks)
- Space: LCD monitors take up much less space than CRT monitors.
- Power Consumption: LCD monitors consume less power.
- Brightness: LCD monitors output a much brighter image than CRT monitors.
- Design: LCDs are thin, compact, and lightweight.
- Color Quality: The quality of color displayed on an LCD screen is better than on CRT
screens.
14. Indicate True or False against each statement in the table below (05 marks)
TRUE/FALSE
(a) Window XP is a graphical user interface operating system TRUE
(b) Presentation software support multimedia TRUE
(c) Word processor have formula bars FALSE
(d) Backup is to combine the content of two or more files to produce FALSE
one output file
(e) The Disk Operating System is menu driven FALSE
15. Company A uses custom-made applications while company B uses off-shelf applications.
Write down any five advantages company B has over company A.
(b) Write down any three precautions taken to prevent software piracy. (03marks)
6 digitalteachers.co.ug
17. The table below shows part of a database. Use it to answer the questions that follow.
(a) Write down the data type entered in the following fields.
E227xxx
(c) The formula entered in the design view to determine TOTAL PAY, which is SALARY and
MONTH is (02marks)
=(SALARY*NO. OF MONTH)
- Diligence: that is Computers perform repetitive task without getting tired and work long hours
without making mistakes
- Versatility: computers perform many tasks with the same accuracy and efficiency
- Accuracy: computers perform tasks with high degrees of exactness
- Flexibility: computers are flexible that they can perform a variety of programmed tasks
- Time saving : high computer speed enables computers to handle tasks quickly even those with
complicated procedures
- Effectiveness: computers process huge volumes of data effectively
- Space saving: computers store a large amount of data saving shelf space
- Low supervision cost: computers perform automatic task that require minimal supervision
- Simplifies work; Computers simplify problem solving using programs designed for the purpose
- Good for information flow; Computers improve information flow in an organization
- Entertainment; Use of computers has ushered in the era of games and music playing
- Multitasking: computers can do many tasks at ago.
19. From the given terminologies used for internet and Networks below, choose the correct
one to complete each of the statements that follow:
A discussion group
7 digitalteachers.co.ug
Instant messaging
Video conferencing
A chat room
Online shopping
Telephony
(a) The type of Internet communication that allows multiple user to exchange messages in
real time is called video Conferencing(01mark)
(b) The type of internet communication that enable individuals to post messages on a
particular topic for others to read and respond is called Instant massaging (02marks)
(c) The use of multimedia communication is called Chart room (02marks)
20. (a) Explain the following terms as used in electronic mail. (02 marks)
(b) State one requirement needed for one to send an email (01marks)
- Computer/smart pone
- Internet connection
- Email address of the receiver
21. (a) Define the term computer (02marks)
A computer is an electronic device that stores, retrieves, processes data and present it in the
form the user desires. A computer operates under the control of a set of instructions that is
stored in its memory unit.
(b) Give any three peripheral devices of a desktop computer (03marks)
- Input devices: Keyboards, mice, scanners, and webcams.
- Output devices: Monitors, printers, and speakers.
- Storage media: CD/DVD drives, external hard drives, and USB thumb drives.
- Communication devices: Network adapters and modems.
- Specialty devices: Game controllers and musical instrument
(pick any three)
NB. A peripheral device is a device that either enters information into a computer
system or receives information from the computer system
They include
8 digitalteachers.co.ug
- Input devices allow you to enter data on a computer, such as a keyboard or a mouse.
- Output devices allow you to see what is happening on the computer screen, such as
a monitor or printer.
- Storage peripheral devices store data, such as a hard drive, pen drive, or SSDs.
- Internal peripheral devices are connected to the PC motherboard, including memory
and video cards.
22. (a) State one reason why a computer laboratory should have (03 marks)
(i) A good lighting system
- ensures clear visibility,
- reduces the risk of accidents,
- enhances accuracy in tasks, and
- promotes the well-being of lab personnel.
(ii) A well ventilated environment
- provide fresh air to the computer operator
- control temperature in the laboratory and computer reducing fire hazards
- controls humidity in the laboratory
(iii) Appropriate furniture
- ensure proper utilization of space
- contributes to pasture, comfort and wellbeing of laboratory personnel
- Ensures safety and compliance with regulatory standards.
-
23. Outline the negative impact of ICT on the following
(a) Economic sector (02marks)
- Unemployment: Automation and advanced technologies can lead to job losses,
especially in roles that are easily automated.
- Cyber security Risks: Increased reliance on ICT makes businesses vulnerable to
cyber-attacks, data breaches, and other security threats
- High Costs: Implementing and maintaining ICT systems can be expensive.
- Workplace Distraction: The constant connectivity provided by ICT can lead to
distractions and decreased productivity
- Technological Dependence: Over-reliance on technology can make businesses
vulnerable if systems fail.
- Work-Life Balance: ICT blurs the boundaries between work and personal life.
(b) Social sector (02marks)
- Digital Divide: Not everyone has equal access to ICT, which can exacerbate social
inequalities.
9 digitalteachers.co.ug
- Privacy Concerns: The use of ICT in social services often involves handling sensitive
personal data that may be pirated.
- Social Isolation: Over-reliance on digital communication can lead to social isolation.
- Mental Health Issues: Excessive use of ICT, particularly social media, has been linked to
mental health issues such as anxiety, depression, and stress.
- Dependence on Technology: Over-reliance on ICT can lead to a lack of basic skills and
knowledge.
- Resource Intensive: Implementing and maintaining ICT systems can be costly and
resource-intensive.
- Running BIOS: When the computer is turned on, the CPU looks for the BIOS (Basic
Input/output System) program and runs it.
- Running POST (Power-On Self-Test): The system checks hardware components for errors
during this step.
- Loading MBR (Master Boot Record) to RAM: The MBR contains information about the
partitions and the boot-loader.
- Running the Boot-loader: The boot-loader loads the operating system.
- Running the OS (operating system): the OS kernel gains access to the hardware
components
(b) State two possible consequences a computer may encounter whenever improper
shut down is done. (02 marks)
- Loss of unsaved documents
- Corruption Unsaved Work:
- Can cause damage to hard drive
- Damages software and operating System
- Decreased Lifespan of Components
10 digitalteachers.co.ug
A – mouse
B – Keyboard
C – touchpad
D – joystick
E - light pen
26. (a) Differentiate between system files and Document files (02 marks)
System files are files that are necessary for your computer to run while document files that can be
viewed or edited by a human user.
(b) Give any three circumstances under which a computer user may choose the option save
as in a file menu
(i) Press Alt + F to open the file menu; Let go of all keys when the file menu appears and Press "
A " to choose the Save As option.
11 digitalteachers.co.ug
(ii) Click the File tab (File menu) and choose SAVE AS.
(iii) alt + F + A
(iv) F12
27. (a) Distinguish between primary storage and secondary storage (02marks)
Primary storage is the temporary, volatile storage of information when the computer is
running that it is directly accessible by the CPU (central processing unit) while secondary
storage is the type of storage that provides long term storage for software programs and data
even when the computer is turned off.
(b) Name one example of primary storage and two examples of secondary storage
(i) Primary – RAM, ROM, cache memory (01 mark)
(ii) Secondary - hard disk drives, solid state drives, USB drives, CDs, and DVDs, floppy
disc, external hard disk, ZIP, (02marks)
It is a graphical feature that makes it easier to access the folder that contains
deleted files.
(iii) My document
It is a graphical feature that makes it easier to access the folder that store documents
and other associated with programs on the computer
It is the number of cycles per second in which a CPU can process instructions.
12 digitalteachers.co.ug
Fetching is the retrieval of information from a source, such as a database, network, or
storage medium. After being retrieved, the data is moved to an alternate location or
displayed on a screen.
30. (a) Explain any two elements of the “off-the-shelf” software. (04marks)
(i) standardized programs that massively produced and ready for use
(iii) they are not explicitly tailored but rather universal and made for widespread
business use
(iii) are easily integrated with existing systems without complex configurations.
31. (a) List any two requirements for internet connection (02marks)
- A computer or device.
- An Internet Service Provider (ISP).
- A telephone or cable line.
- A modem or a network card.
- A company providing Internet connection(ISP)
- Communication Software (Web browser)
- Faster communication
- Access to information
- Transfer of research papers
- Advertising
- Marketing
- Easy banking
- Access to a global audience
13 digitalteachers.co.ug
- More efficient government services.
- Cultural sharing and diversity.
- Virtually unlimited entertainment options, videos and music
32. (a) State one function of each of the following utility programs (03marks)
File compression Utility a program that compresses and decompresses various file types
NB. Utility software is a program or tool that performs specific tasks to enhance productivity,
efficiency, functionality, or maintenance of a computer system.
33. (a) Write WWW in full as used in internet technology (01 marks)
A web browser is a program used to access and view websites or website information.
A search engine is a software program that helps people find the information they are looking
for online using keywords or phrases.
(i) Web browser: Google chrome, opera, Internet Explorer, Mozilla Firefox
14 digitalteachers.co.ug
(ii) Search engine: Google, Yahoo!, and MSN Search.
34. (a) Differentiate between IP address and domain name (02 marks)
An Internet Protocol (IP) address is the unique identifying number assigned to every device
connected to the internet.
A domain name is web address that helps users find your website.
It is a set of rules and guidelines for transmitting electronic mail (email) over a network.
NB. A protocol is a set of rules and guidelines for communicating data. These rules
define how computer or devices should interact during communication, ensuring
successful data transmissions.
35. (a) Outline any three violation of computer ethic usage by computer user
15 digitalteachers.co.ug
- protect data with password
- restrict access to company computers
- Use of watermarking to make pirate content traceable.
- Report pirated content to marketplaces
- Educating work that information piracy is illegal
- Use of Legal & Enforcement to punish those involved in information piracy
- sender,
- receiver,
- communication medium,
- the message to be communicated, and
- certain rules called protocols to be followed during communication.
37. The table below shows a budget for introduction ceremony.
A B C D E
1 ITEM UNIT COST QUANTITY TOTAL COST TOTAL COST
IN SHS IN £
2 Cultural dress 180,000 2
3 Food 3,500 150
4 Decoration 1,200,000 1
5 Soda 19,000 13
6 Mineral water 15,000 5
7 Exchange rate
of £1 = 4,630
(a) Which computer application was used to design the given budget? (01 mark)
Excel
(b) Identify the cell formatting feature which was applied to contents in D1 and E1
(01mark)
Capitalize
D2 =(b2*c2)
D3 =(b3*c3)
D4 =(b4*c4)
D5 =(b5*c5)
16 digitalteachers.co.ug
D6 =(b6*c6)
(ii) TOTAL COST in pounds (£) (use the exchange rate in cell B7) (02marks)
E2 =(D2/4,630)
E3 =(D3/4,630)
E4 =(D4/4,630)
E5 =(D5/4,630)
E6 =(D6/4,630)
38. Describe any five tasks that are performed by digital forensic specialists (05marks)
39. (a) State the use of each of the following features in a presentation:
A looping slideshow displays each slide automatically for a certain amount of time. Once
that time has elapsed, the slide automatically continues to the next slide.
Slide transitions are the animation-like effects that happen when you move from one
slide to the next during a presentation.
(iii) Hyperlinks
They are words, shapes, or images, when clicked allow movement between slides or
redirects computer user to a specified url
17 digitalteachers.co.ug
(i) Handouts
- Ensure the contents of an oral presentation can be reviewed by the audience after the
presentation.
- avoid information congestion on slides because some of information is presented in
handouts
- keep the presentation on track,
- remind the audience of the message,
- allow audience follow-up and retain viewers' attention.
(ii) Note pages
40. (a) Outline any two uses of a server in a computer networking. (02 marks)
41. (a) List three major specification one would consider when buying a laptop computer
(03marks)
(i) Processor speed
(ii) Screen size and resolution.
18 digitalteachers.co.ug
(iii) Storage Space
(iv) Size of ram
(v) Presence of graphic card
42. (a) Distinguish between cold booting and warm booting (02 marks)
19 digitalteachers.co.ug
44. (a) Give two reasons why file management is important in computer system (02marks)
(i) Eases finding and accessing a file
(ii) Maintains data integrity by preventing accidental deletion or alteration of files
(iii) Ensures data security.
(iv) Ensure saving of related files in the same folder
(v) Standardized processes of files
(b) List three operations which can be performed on a file (03 marks)
- Saving
- opening
- editing
- copying
- moving
- renaming
- deleting files.
Troubleshooting is a systematic process used to locate the cause of a fault in a computer system
and correct the relevant hardware and software issues.
(b) State three ways in which one can troubleshoot a computer that has failed to start.
20 digitalteachers.co.ug
(i) manages files,
(ii) manages memory,
(iii) manages processes,
(iv) handles input and output,
(v) controls peripheral devices like disk drives and printers
It is software that is developed specifically for some specific organization or other user.
(b) State the role of each of the following CPU components (03 marks)
21 digitalteachers.co.ug
(i) BUS transfer data between components or devices connected to computer.
(ii) Control unit manages a computer’s operations
(iii) Registers are small amounts of high-speed memory contained within the CPU. They are
used by the processor to store small amounts of data that are needed during processing,
such as: the address of the next instruction to be executed.
Utility software is a program or tool that performs specific tasks to enhance productivity,
efficiency, functionality, or maintenance of a computer system.
Wireless hotspots are wireless access points, typically in public location, that provide internet
access to mobile devices such as your laptop or smartphone when you are away from the office
or your home.
An ISP is a company that provides web access to consumers and businesses through various
channels, such as cable, DSL, fiber, or wireless.
A search engine is software that searches a database of information according to the user's
query.
- Slowing down
- Unexpected pop-up windows
- Unwanted programs starting automatically
22 digitalteachers.co.ug
- Missing files and programs
- System crashing
- Being locked out of your computer
- Mass emails sent from your email account.
- Your security software has been disabled.
- Your battery drains quickly.
54. (a) Give two reasons to justify ownership of institutional website (02 marks)
- Enhances your brand image. When it comes to corporate digital presence, the company's image
grows stronger as it dominates new channels.
- Serves as information bank about the institution
- Increases visibility and accessibility because information is available to globe 24/7 online
- Markets institution’s good and services.
- Facilitates communication between the institution and its clients
- A well-designed website enhances the institution’s credibility and professionalism, helping to
build trust among stakeholders.
- It may act as resource centre by hosting a variety of resource such as research publication,
online courses and digital libraries.
- Facilitates interaction between the institution and its clients through features like forum,
contact us, comments.
A web browser is a program used to access and view websites or website information.
(ii) Under what circumstances can someone use a Uniform Resource Locator (URL) in a
web browser? (02marks)
(i) Higher production rates and increased productivity automated machines work 24/7
(ii) Improved worker safety since dangerous work is assigned to robots
(iii) better and consistently high quality production
(iv) Reduced space required for production
(v) Reduced human errors
(vi) Reduced lead times: automation streamlines production processes thereby reducing
the time it takes to bring product to market.
23 digitalteachers.co.ug
(vii) Flexibility and adaptability: modern automation technologies can quickly adapt to
new production schedules or products making it easy for businesses to respond to
market changes
(ix) reduced wastage of materials since automated systems are efficient
Data communication, the process of transferring data over a transmission medium between
two or more devices, systems, or places.
- Computers to be networked
- Software to enable connected computers to operate
- Router: Connects your network to the internet and manages traffic between devices.
- Modem: Connects to your ISP (Internet Service Provider) and provides internet access.
- Switch: Expands the number of devices you can connect in a wired network.
- Access Point: Extends the range of your wireless network.
- Cables: Ethernet cables (Cat5, Cat5e, or Cat6) for wired connections.
- Network Interface Cards (NICs): Required for each device to connect to the network.
57. For questions (a) – (e), fill in the missing words from the list below
Cell Column
- Lacks non-verbal cues such as body language and facial expression that enhance
understanding
24 digitalteachers.co.ug
- Information overload caused by constant influx of massages, emails and
notifications.
- Risks to security and privacy concerns to cyber-attack vulnerability.
- Impersonal nature
- Technical issues such as lack of internet connection disrupts communication
- Prolonged use of electronic devices can lead to physical health problems such
headaches and poor postures.
- Distractions and interruptions: popup sounds associated to electronic
communication can lead to frequent distractions and interruptions, affecting
productivity and focus.
59. (a) Give two situations under which electronic presentation would be used (02marks)
- Business meeting
- Teaching
- Conferences and seminars
- Training sessions
- Sales pitches
(b) State three advantages of using electronic presentation over the traditional chalk and talk.
An intranet is a private network contained within an enterprise that is used to securely share
company information and computing resources among employees.
25 digitalteachers.co.ug
An Extranet is a private network contained within an enterprise shared by internal and
selected, external parties, such as business partners, suppliers, key customers, etc.
A local area network (LAN) is a collection of devices connected together in one physical
location, such as a building, office, or home.
(c) Suggest an area network which is restricted to connecting users in a city. (01mark)
61. (a) Name one tool used to remove dust from a computer. (01 marks)
- Electric Duster / Air Blower blow dust from key board and hidden parts of the computer.
- Anti-Static Brush is used to remove or scrape off the very fine dust that sticks to the fan blades
and inside the fan frame.
- Microfiber Cleaning Cloths wipe of dust from the computer
- Screen Cleaners (Also known as Screen Cleaning Solutions) are used together with microfiber
cleaning clothes to remove dirt, fingerprints, and dust from a computer.
- Vacuum Cleaners extract dust from key board and hidden parts of the computer.
(b) Give reasons why one would require the following in the computer laboratory (03marks)
(i) Uninterruptible Power Supply (02 marks)
- Keep computer running for at least a short time when incoming power is interrupted to
prevent loss of unsaved data and to allow proper shutdown of computer.
- Prevent damage to computer in event of power failure
- Stabilize power
- Prolonged usage of computer in during abrupt power shutdown and thus increased
efficiency.
.
62. (a) Write the procedure for changing the name of existing file or folder (03 marks)
(i) Open File Explorer and navigate to the location where the file or folder is stored.
(ii) Right-click the name of the file or folder you wish to rename.
(iii) Click Rename (on the menu that opens up).
26 digitalteachers.co.ug
(iv) Type a new name for the file and press Enter.
63. Write the following in full as used in Information and Communication Technology
- On the basis of size and capacity: Supercomputer, Mainframe, Mini, and Micro Computer.
- On the basis of purposes: General and Special Purpose.
- On the basis of hardware design and type: Analog, Digital, and Hybrid Computer.
- Personal Computers (PCs)
- Workstations
(b) Give the function of any one category you have stated in 5(a). (01mark)
66. Indicate TRUE or FALSE against each statement in the table below. (05marks)
27 digitalteachers.co.ug
(a) Open source software is copyrighted and distributed without T
cost for trial period
(b) Product activation is used to ensure that software is not T
installed illegally
(c) Programming software interfaces user application and F
computer hardware
(d) A file extension is a combination of characters used to F
identify a file NB. it identifies a type of file
(e) A clipboard holds copied data T
67 (a) Define the term hardware as used in Information and Communication Technology
(02marks)
Hardware refers to the external and internal devices and equipment of computers that enable
input, output, processing and storage of data.
(b) Name two ports used to connect devices on a computer (02marks)
- USB port
- HDMI
- Ethernet
- VGA
- DVI (Digital Visual Interface)
- Thunderbolt
- Audio Jack used to connect headphones, microphones and speaker
(c) Give one device that can be used to transfer a hardcopy document to a computer.
(01marks)
Scanner
Digital camera
- manages files,
- manages memory,
- manages processes,
- handles input and output,
- controls peripheral devices like disk drives and printers
69. (a) Distinguish between Reading and writing in relation to storage medium. (02marks)
28 digitalteachers.co.ug
Reading from storage media means that user is copying or moving data form storage media to
the computer.
Writing to storage media means that user is copying or moving data to storage media from the
computer.
(b) Mention one example for each of the types of storage devices given below
70. (a) Name two examples of documents created using desktop publishing applications.
(02marks)
(i) Brochures
(ii) News papers
(iii) Magazines
(iv) Greeting card
(v) flayers
(b) State any three desktop publishing features that can be enhance enhance the document
you named in 10(a) (03 marks)
- Text tools that allow creation of documents with various fonts, text wrapping, drop caps
and paragraph styles
- Graphic tools for easy insertions and edit of images
- Page layout tools such as grinds and guides to align elements precisely on page and use of
layers to organize different elements on separate layer to easier editing and complex
designing.
- Provision for master templates with consistent headers, footers and other repeating
elements
- Interactive elements such as hyperlinks and multimedia integration tools for audio and
videos into a document.
- Provision of stylish templates for brand development and maintenance.
71. (a) Outline any three threats that a system Administrator may face as a result of networking
(02marks)
29 digitalteachers.co.ug
- Malwares such viruses, worms and Trojans that infect systems, steal data or cause
disruption
- Phishing: e-mail phishing are deceptive e-mails that trick user into revealing sensitive
information and spear phishing ot targeted attacks on specific individuals within an
organization.
- Network Hacking or unauthorized access to network resources to steal data or disrupt
services
- Insider threats where employ or contractor misuse their access to harm the organization.
- Distributed Denial of Services (DDoS) that cause service disruption.
- Social Engineering or manipulating individuals into divulging confidential information
- Advanced Persistent Threats (APTs) or long-term targeted attacks aimed at stealing data
or spying on the organization.
- SQL Injection (SQLi) attacks or exploiting vulnerabilities in web application to access or
manipulate database
- Man-in-the- middle (MitM) attack or intercepting and altering communication between
two parties without their knowledge.
- Weak Security Control or poorly configured systems and outdated software that can be
easily exploited by attacks.
(b) Suggest two measures that the system administrator can employ to reduce the network
threats. (03marks)
72. Study the data communication below and answer the questionsthatfollow
A C
30 digitalteachers.co.ug
(a) Name the elements of data communication (02marks)
A - sender /transmitter
B – transmission medium
C – receiver
(b) Suggest the device used to connect A to B (01 mark)
Cable/wire/ transmission media
wireless
(c) State the protocol used to uniquely Identify A and C (01mark)
A – Encodes/encrypts data
C – Decodes data
73. The table below consist of some of the peripheral devices of a computer. Indicate Input or
output (05 marks)
- Teaching
- Lectures
- Demonstration
- Project report
31 digitalteachers.co.ug
- Workshops
- Marketing reports
- training
- Microsoft PowerPoint
- Google Slides
- Prezi
- Pitch
- Visme
- Keynote
- Haiku Deck
- Canva
(b) Give the importance of each of the following features as used in electronic presentation
(i) Master slide
- Enhances presentation efficiency i.e. changes made on the master slide apply to all
slides in the presentation saving time for individual slide manual editing
- Consistency i.e. all slides will carry the same log, color, fonts etc.
- Enhances visual effects.
32 digitalteachers.co.ug
- Enhance appearance
- Control speed
76. (a) State three advantages of using e-mail service over sending mail by post. (03 marks)
- Novel Netware
- Apple talk
- Digi card
- NanjaOne
- Intermapper. Useful Free Network Tools.
- Econet for acorn computers
- UNIX Windows for work groups
78. Outline five ways in which a student can use the Internet. (05marks)
- Access To Knowledge: the internet provides students with a wealth of knowledge from all
over the world.
- Students access online tutorials and classes
- Research Work Becomes Easier
- Internet facilitate communication of students with teachers and peers through emails and
chartrooms.
- Internet provide platform for students to express their creativity.
33 digitalteachers.co.ug
- It is convenient to access libraries and database resources.
Transmission media is the physical path between the transmitter and the receiver through
which data is sent from one place to another.
(ii) Give two examples of data transmission media. (02marks)
- Cable/wired
- wireless
(b) Name two services offered by data communication tools. (02marks)
- mails
- video conferencing
- SMS
- Phone calls
- Tutorials
- entertainment
80. (a) Give any two services that use electronic payment (E-payment) method. (02 marks)
- reliable
- fast
- secure: reduces risk of theft
- low cost
- convenient because it can be done anywhere at any time
81. In the modern world every person is endeavoring to access to information. Give five
reasons why students in secondary schools should not be allowed to have mobile
phones
- Poor time management when excess time is spent on the internet
- High cost of data
- Inaccurate information
- Exposure to pornography leading to early sex and unplanned pregnancy
- May contract gambling habits
34 digitalteachers.co.ug
- Information overload
82. (a) Explain the importance of servicing and maintenance of computers (02 marks)
83. Use the image below to answer the questions that follow:
(a) Write down the path for subfolder called My videos. (03marks)
35 digitalteachers.co.ug
- Method 4: Undo Deletion with Ctrl + Z
- Method 5: Recover a Deleted Folder Using Data Recovery Software
84. Describe the following terms as used in Information and Communication Technology
(ICT) (05marks)
(i) System unit is a case containing all the main parts of a computer, also known as a box,
main unit, or system box.
(ii) RAM chip is a small electronic device that stores data temporarily on a circuit board.
(iii) Power supply is an electrical device that supplies electric power to a computer.
(iv) BUS is a communication system within a computer or between computers that transfers
data between different components.
(v) Peripheral devices is a device that either enters information into a computer system or
receives information from the computer system
A file extension is the character or group of characters after the period that makes up an entire
file name
(b) Fill in the right file extensions for the following files. (03 marks)
36 digitalteachers.co.ug
An output device is a hardware component of a computer system that displays information to
users.
(b) Give two categories of printers and an example in each case:
89. Indicate TRUE or FALSE against each statement in the table below
STATEMENTS TRUE/FALSE
(a) Public domain software is copyrighted FALSE
(b) Off-the-self software is developed and sold for TRUE
profit
(c) Source codes of open source software programs TRUE
are only available to paid up subscribers.
(d) Shared programs are widely available from variety TRUE
of download sites on internet.
(e) Freeware programs are frequently developed by FALSE actually freeware are
only amateur programmers complex software
37 digitalteachers.co.ug
90. (a) Define the term motherboard. (02marks)
(b) Identify any three components housed on them motherboard (03 marks)
A frame is rectangular spaces where you can place text, images, or other elements.
(ii)Template (01 mark)
(c) Name a document that can be produced using publication software (01 mark)
38 digitalteachers.co.ug
92. Complete the table below (05marks)
Application Purpose
(a) Word processing
93. Computer data and software are exposed to number of risks hence need for great care and
protection. Suggest five ways of protecting data and software (05 marks)
94. (a) Give three benefits of sending documents using email service. (03 marks)
- Instant/faster communication
- Easy file sharing and collaboration
- Reduce postage costs
- It is environmentally friendly
- Convenient: letters are created and sent from anywhere.
- Improve document security.
- Mails can be sent and receive simultaneously to multitude of recipients at ago.
- Allows for a high degree of customization, enabling businesses to tailor their communications
to specific needs.
(b) State two benefits for sending documents using ordinary post? (02 mark)
39 digitalteachers.co.ug
- It tangible creating stronger impression
- Carry physical parcels that e-mail can’t
- Proof of existence of receiver and residence
- Post office are not prone to hacking
- Personal touch: Handwritten letter or cards carry a sentimental value that email can’t replicate
95. Use the terms to complete the statements that follow: (05marks)
(a) The science of representing behavior of real life situation using a computerized mode is
simulation.
(b) The technology that allows an electronic device to exchange data using radio waves of a
computer network is WIFI
(c) The technology that allows users to transfer data for short distances between mobile
devices is Bluetooth
(d) The technique that rates images by a computer that appears to surround the person looking
at them is Virtual reality
(e) The science of computers that enable qualities of human being to be imitated is Artificial
intelligence
96. (a) Distinguish between a hyperlink and home page (02 marks)
Hyperlink is a group of words, shape, or image, when clicked allows movement between
documents, presentation slides or redirects computer user to a specified URL.
(b) Identify three netiquette guidelines while using the internet. (03marks)
- empathy
- use friendly tone
- use respectful language
- Send messages if appropriate
- Check for grammar mistakes
- Respect people’s privacy
- Respond to e-mails on time
- Create clear and accurate posts
40 digitalteachers.co.ug
(b) Identify three limitations of wireless transmission media. (03marks)
98. Choose the correct terms to complete the statements (a) – (e). (05marks)
99. Explain each of the following terms as used in information and communication Technology:
(05marks)
(i) Communication
Communication in ICT refer to the tools used to send, receive and process information
(ii) Network
A network is a connection of at least two computers either by cable or wireless
connection.
(iii) Protocol
A protocol in ICT is a standard set of rules that allow electronic devices to communicate with
each other.
(iv) Modem
A modem is a hardware component that allows a computer or another device to
connect to the computer.
(v) Bandwidth
Bandwidth is the amount of information that something, like a connection to the internet, can
handle at a given time.
41 digitalteachers.co.ug
- Cashless Transactions
- Education
- Social Networking
- Entertainment
101. (a) Distinguish between Random Access Memory (RAM) and Secondary storage (04marks)
RAM (computer memory) is used to temporally store data that is required for processing within the
CPU.
Secondary storage/ auxiliary storage, is any non-volatile storage medium that holds data until it is
deleted or overwritten.
103. (a) Distinguish between computer servicing and computer repair (02 marks)
Computer servicing is the regular maintenance and upkeep required to keep your computer
running smoothly and efficiently.
Computer repair is the process of fixing a computer that has broken down or malfunctioned.
(b) Write one reason for having the following items in the computer laboratory
(i) Wooden carpet (01mark)
It is noiseless and durable floor
(ii) Blower (01marks)
104. (a) Don is a new computer user. As an ICT student advise Don on which tool to use
42 digitalteachers.co.ug
(i) to trace files he cannot locate (01 mark)
Click ‘Computer’ or ‘This PC’ then click in the Search field and enter part or all the file name
you want to find.
(ii) to trace a word from an open document (01 mark)
Control+ F or click Home and then Find
(b) A student is typing using Microsoft word. Write down three steps the student will use
to shut down the computer (03 marks)
(i) Save the document and close word file
(ii) In the Start menu, click on the power icon. A submenu will appear. - Shut Down:
(iii) Click on the "Shut Down" or "Power Off" option in the submenu.
105. (a) State five activities that can be performed on a computer using a mouse piece.
(05marks)
106. Identify five ICT related employments opportunities in Uganda to day (01 marks)
- Teaching
- Computer repair and maintenance
- Computer and parts sales
- Computer Programmers.
- Web Designers.
- Database Analysts.
- Project Managers.
- Social Media Managers.
- Social Community Managers.
- Security/Networking Analysts.
- Technology Support.
43 digitalteachers.co.ug
Multiprocessing is the ability support more than one processor or allocate tasks between
them.
(b) Give two advantages of each of the following operating systems (02marks)
(i) windows (02 marks)
44 digitalteachers.co.ug
(b) State three problems associated with usage of packaged application. (03 marks)
- Packaged software is a standard program solution and may not be appropriate for all
organizations.
- It is costly to maintain when future upgrades are required, or new versions are needed.
- It is time-consuming to install and maintain.
- Limited customization
(b) Show three ways in which the internet can facilitate trade and business (03 marks)
- Online Businesses (E-commerce)
- E-marketing
- Cashless Transactions
- Education and training
110. (a) Show one way in which the internet can be a danger to: (02marks)
45 digitalteachers.co.ug
- Addition to malicious information and behavior.
- Cyber rimes
(e) Information
- Hacking, where unauthorized users gain access to computer systems, email accounts, or
websites.
- Spread of false information
- Identity theft.
- Data breaches.
- Malware and viruses.
- Phishing and scam emails.
- Fake websites.
111. Explain the following attributes of computers which make them dependable and reliable
tools (02marks)
Computers perform repetitive task without getting tired and work long hours without making
mistakes
(ii) Versatility (02 marks)
Computers perform many tasks with the same accuracy and efficiency
(iii) Accuracy
Computer literacy is the ability to use computers and information technology efficiently
(b) Outline any three ways in which ICT can improve the quality of education (03 marks)
- provides interactive and engaging content.
- facilitates personalized learning.
- enables access to a wealth of resources.
- fosters collaboration and communication among students and teachers.
- Improves reading and listening skills
- Stores information for future reference
113. (a) Differentiate between copy a file and move a file. (02 marks)
Copying – make a duplicate of the selected file or folder and place it in another location.
46 digitalteachers.co.ug
Moving – move the original files or folder from one place to another (change the destination).
(b) Study the file path below and answer questions that follow:
F:\accounts\bursar\fees.xls
(i) Identify the file name (01 mark)
Fees.xls.
(ii) On what drive is the file located (01 mark)
F
(iii) In which sub-folder is file located(01mark)
Bursar
- scanner
- mouse
- Camera
- keyboard
(b) Give a function of any two input devices listed in (a) above (02 marks)
(b) (i) Which type of organization doe a the domain name of the email user above,
subscribe to? (01 mark)
yahoo.
(ii) Give any other examples other than you have stated in (b)(i)above (01mark)
Google
hotmail
47 digitalteachers.co.ug
(b) Give three disadvantages of networking computer. (03marks)
- Has high initial cost to setup
- Encourages spread Virus and Malware to network computers
- Disruptions can occur frequently.
- Computer Networking can direct us to various types of distractions.
- It requires a specific type of setup.
- May lead to loss of information easily
A server is a computer that provides and authorizes resources or services for the client
computer.
A bridge is a network device that connects multiple sub-networks to create a single network
A switch enables connected devices to share information and talk to each other.
118. The table below shows a worksheet which Nabirye was working on
1 A B C D E
ID number Name Item 1 Item 2 Item 3
2 100000 Akello 990 34 29.1
3 100002 Nambi 660 - #DIV/0!
4 ######### 880
5 #NAME?
6
48 digitalteachers.co.ug
(a) (i) Suggest a reason why the entry in cell A4 appear as shown (01 mark)
Microsoft Excel might show ##### in cells when a column isn’t wide enough to
show all of the cell contents.
(ii) How do you rectify the error in cell a4? (01marks)
It rectified by
- Increase width of the cell
- Reduce the font of the text
- Decrease the number of decimal point
(b) What does the error in cell E4 mean? (02marks)
The #DIV/0! error occurs when you attempt to divide a number by zero.
(c) How do you correct the error in cell C5? (01 marks)
#NAME? is a common Excel error notation that appears when a formula or function cannot find
the referenced data it needs to complete the calculation.
119. (a) Tick the three utility programs from the list below (03marks)
Tick
Web browser
Data compressor x
Disk defragmenter x
Operating system
Antivirus software x
(b) State the functions of any two utility programs you marked in (a) above. (02marks0
120. (a) Explain the following terms giving examples in each case. (02 marks)
49 digitalteachers.co.ug
(ii) Half duplex (02 marks)
In half-duplex mode, each station can both transmit and receive, but not at the same time.
Example: walkie-talkie - a two-way radio that has a push-to-talk button
Tick here
Optic fiber
Bluetooth x
Twisted pair
121. (a) Explain the term Information and Communication Technology. (02marks)
(b) State three ways in which Information technology has improved communication
(03marks)
(i) fast
(ii) reliable
(iii) cheap
(iv) improved shopping and payment methods
122. Give one reason why a school director would purchase the following equipment for a
computer laboratory (03 marks)
(i) Blower (01 marks)
Blows dust off and out of the computers
(ii) Anti-glare filter screens (02marks)
Improves vision of the screen
(iii) Air conditioner (02marks)
Maintains favorable temperatures in the computer laboratory
123. During a practical examination, student was required to open a blank file and save is as.
D:\STUDENT WORK\EOT PRACTICAL\safety.doc
(a) State the name of the immediate subfolder in which students must save the file
(01 marks)
EOT PRACTICAL
(b) Write the root directory onto which the file must be saved. (02 marks)
D:
(c) Suggest one example of a computer application the student can use to create the file.
(01 mark)
50 digitalteachers.co.ug
Word processing .
(d) State the name of the file represented by the above file path. (01 mark)
Safety.doc
124. Study the devices below and answer questions that follow
125. Read the statement below and write the word TRUE or FALSE in the space provided
(05marks)
STATEMENT TRUE/FALSE
(a) Machine code is one of the low level computer TRUE
language
(b) Microsoft is the only operating system in use in FALSE
Uganda
(c) WINZIP is an example of a system software which TRUE
reduces the actual size of a file
(d) A student delivering a presentation would need an
LCD projector and a laptop TRUE
(e) Screen saver can be categorized as desktop FALSE
publishing software since they can be used for
advertising purpose
51 digitalteachers.co.ug
126. (a) State two adverse effects of using Internet for business and communication (02 marks)
- (i) Unemployment: Automation and advanced technologies can lead to job losses,
especially in roles that are easily automated.
- Cyber security Risks: Increased reliance on ICT makes businesses vulnerable to
cyber-attacks, data breaches, and other security threats
- High Costs: Implementing and maintaining ICT systems can be expensive.
- Workplace Distraction: The constant connectivity provided by ICT can lead to
distractions and decreased productivity
- Technological Dependence: Over-reliance on technology can make businesses
vulnerable if systems fail.
- Work-Life Balance: ICT blurs the boundaries between work and personal life.
(b) Suggest the most appropriate Internet Communication Service in the following
situations:
(i) Online meeting between two company employees in geographically separated
regions. (01 mark)
Video conferencing software
(ii) Instant and real time communication between friends. (01 marks)
(iii) Typed views on an on-going online discussion among a specific group of people.
(01 mark)
Email
127 (a) Identify any three devices other than computers required to set up a network within
a school environment. (03marks)
- Router: Connects your network to the internet and manages traffic between devices.
- Modem: Connects to your ISP (Internet Service Provider) and provides internet access.
- Switch: Expands the number of devices you can connect in a wired network.
- Access Point: Extends the range of your wireless network.
- Cables: Ethernet cables (Cat5, Cat5e, or Cat6) for wired connections.
- Network Interface Cards (NICs): Required for each device to connect to the network.
52 digitalteachers.co.ug
128. (a) List three possible threats to data networked environment (02marks)
- Malwares such viruses, worms and Trojans that infect systems, steal data or cause
disruption
- Phishing: e-mail phishing are deceptive e-mails that trick user into revealing sensitive
information and spear phishing ot targeted attacks on specific individuals within an
organization.
- Network Hacking or unauthorized access to network resources to steal data or disrupt
services
- Weak security control
- Insider threats where employ or contractor misuse their access to harm the organization.
(b) Name any two types of security measures which can be used to control the threats
listed in (a) above (0 marks)
- (Install antivirus software
- Create strong password
- Use firewalls to block unauthorized access to the network
- Encrypt Dada to protect it from unauthorized access
- Regular Backups to store data in multiple location
- Train users about cyber security and to recognize phishing attempts and other
social engineering attacks.
- Monitor Network activity using intrusion detection systems (IDS)
129. Given below is a notice which a head girl has typed and intends to pin up on all the notice
boards in the school.
FEE 5000
53 digitalteachers.co.ug
130. (a) Suggest one way in which computers have been made user-friendly for persons that
are physically challenged in the following areas (04marks)
(b) Give three health issues that may be caused by prolonged use of computers. (03 mark)
131. (a) Choose the appropriate file extensions from the list given for sentences (a) to (e)
132. (a)State any three operations of the machines of a central processing Unit (03marks)
- Registers are small amounts of high-speed memory contained within the CPU. They are
used by the processor to store small amounts of data that are needed during processing,
such as: the address of the next instruction to be executed.
- Control unit is a unit that controls all activities that go on within the computer
- Arithmetic Logic Unit ALU is where all calculation and logic operations happen
- RAM (computer memory) is used to temporally store data that is required for processing
within the CPU.
(b) Describe any one of the operations stated in (a) above. (02marks)
54 digitalteachers.co.ug
……..………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………………
133. (a) A set of instructions that are arranged inn a logical way to run a computer is
called (01 marks)
Software
(ii) Operating system manages hardware, software resources, and provides common services
for computer programs. Drivers allow operating system to communicate with hardware
devices like printer, graphic cards, network adapters etc.
(iii) Utility software performs maintenance tasks such as disk cleanup, antivirus scanning and
file management to ensure the system runs smoothly.
(iv) Firmware is low-level software embedded in hardware devices, providing control and
communication between the devices and other system components.
(v) Boot loaders are responsible for loading operating system into computer’s memory when
the system is powered on
(vi) Language processors/translators translate high-level programming languages into machine
codes that the computer can execute.
- Microsoft PowerPoint
- Google slide
- Keynote
134. (a) Give three benefits of connecting computers to the internet (03 marks)
- Faster communication
- Access to information
- Transfer of research papers
- Advertising
- Marketing
- Easy banking
- Access to a global audience
- More efficient government services.
- Cultural sharing and diversity.
- Virtually unlimited entertainment options, videos and music
(b) Outline two disadvantages of connecting computers to the internet. (02marks)
55 digitalteachers.co.ug
- Malware and viruses.
- Hacking, where unauthorized users gain access to computer systems, email accounts, or
websites.
- Fake websites.
- Spread of false information
- Identity theft.
- Data breaches.
- Phishing and scam emails.
135. Explain why an organization would prefer to use Electronic mail (E-mail) over ordinary
mail (05 marks)
137. Use the terms below to complete the sentences that follow I (a) – (e) (05 marks)
(a) The Visual movement from one slide to another Slide transition
(b) The slide design set up the way text/objects appear on a slide during a presentation.
(c) The presentation of slides in sequence on a projection screen is referred to as slide
show
56 digitalteachers.co.ug
(d) The Slide layout defines the arrangement of all items that make up a slide
(e) A user can print the entire presentation on one page by printing the handouts
138. (a) State one difference between a Compact Disc (CD) and Digital Versatile Disc (DVD)
(01marks)
(b) Explain the circumstance under which the following storage devices are used.
- They are used in storing data like pictures, documents, and videos.
- They are also used in creating data backups.
- The data and information in the memory card can be password protected.
- The memory card can easily be transported from one place to another.
- They are non-volatile and possess an incredible data transfer rate hence used globally.
(ii) Flash disk (02mark)
(i) Interpreters
An interpreter is a software that converts high-level language code to machine code line
by line and executes it immediately.
(ii) Syntax
Syntax is a set of rules that determine how to arrange characters in a valid statement in a
language.
(iii) Debugging
Debugging is the process of identifying and resolving errors or bugs in a software system.
- Simplicity: A good programming language should be easy to understand and use, with clear
syntax and semantics.
57 digitalteachers.co.ug
- Readability: The language should promote code readability, making it easy for programmers
to understand and maintain the code.
- Expressiveness: A good programming language provides expressive power, enabling
developers to write concise and meaningful code.
- Scalability: Scalability is the ability of code to handle an increasing amount of data and
traffic.
- Testability: Testability is the ability to write automated tests to verify the correctness of the
code.
140. Using the email address [email protected], identity these parts stand for.
Please obtain free downloadable notes of general paper, biology, economics, geography etc. from
digitalteachers.co.ug website
Thanks
58 digitalteachers.co.ug