Computer studies
Computer studies
(Do not write your School/Centre Name or Number anywhere on this booklet).
840/1
COMPUTER STUDIES
Paper 1
Oct. / Nov. 2022
21/2 hours
INSTRUCTIONS TO CANDIDATES:
Write your name, signature, random and personal number in the spaces above.
1 Turn Over
© 2022 Uganda National Examinations Board
SECTION A: (20 MARKS)
Answer all questions in this section.
1. The following devices were invented during the mechanical era except
A. Leibniz Calculator.
B. Analytical engine.
C. Pascal’s arithmetic machine.
D. Logathrim tables.
3. An intranet is a
A. security system to protect against external threats.
B. network that used to connect suppliers and producers.
C. private network within an organization that may have one or more LANs.
D. program that increases the performance of a large organization.
2
7. In word processing , the process of trimming parts of an image is referred to as
A. editing.
B. compressing.
C. resizing.
D. cropping.
8. The term Computer software refers to
A. tangible parts of a computer.
B. computer programming language.
C. a set of instructions that run a computer.
D. a set of processes in a computer.
9. The group of storage devices that use reflected light to read and write data
stored on them is
A. flash disk, floppy diskette, and zip disk.
B. memory stick, memory card, and flash disk.
C. compact disk, digital versatile disk and blu-ray disk.
D. smart card, micro film, and microfiche.
3
13. Memory management in a computer is a function of
A. Application software.
B. Operating system software.
C. Utility programs.
D. Programming languages software.
15. The ability to hold online meetings with several people in different geographical
locations is referred to as
A. video conferencing.
B. short messaging services.
C. online charting.
D. instant messaging services.
16. A computer may not boot due to the failure of the following except the
A. hard disk.
B. application software.
C. power supply.
D. system software.
17. The appropriate filed data type that should be assigned to the number
BK702789 is
A. Text.
B. Memo.
C. Number.
D. Lookup.
4
19. The authentic product is determined by the product
A. brand name.
B. digital stamp.
C. key.
D. code.
……………………………………………………………………………
……………………………………………………………………………..
……………………………………………………………………………
……………………………………………………………………………..
(b) Give one reason why it is important to study computer. (02 marks)
……………………………………………………………………………
…………………………………………………………………………….
5
(c) Describe two ways in which computers can be used to commit crimes.
(04 marks)
(i) ………………………………………………………………………
…………………………………………………………………………….
(ii) ………………………………………………………………………
…………………………………………………………………………….
……………………………………………………………………………
……………………………………………………………………………
…………………………………………………………………………….
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………..
……………………………………………………………………………
…………………………………………………………………………….
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………..
6
23. (a) The spreadsheet below shows scores for four houses during their sports.
Use it to answer questions that follow.
(i) Write the cell address of the active cell. (01 mark)
……………………………………………………………………………..
(ii) Write a function that will return the value of the total score for
Yellow House. (02 marks)
……………………………………………………………………………..
(iii) Write the function that will compute the highest total score.
(02 marks)
……………………………………………………………………………..
……………………………………………………………………………
……………………………………………………………………………..
……………………………………………………………………………
…………………………………………………………………………….
……………………………………………………………………………
…………………………………………………………………………….
7
24. (a) Explain the meaning of the following data transmission modes and
mention one example in each case:
(i) Simplex transmission. (02 marks)
……………………………………………………………………………
……………………………………………………………………………..
……………………………………………………………………………..
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………..
……………………………………………………………………………
……………………………………………………………………………..
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………..
……………………………………………………………………………
…………………………………………………………………………….
8
(ii) Footnote. (02 marks)
……………………………………………………………………………
…………………………………………………………………………….
……………………………………………………………………………
……………………………………………………………………………..
……………………………………………………………………………
…………………………………………………………………………….
……………………………………………………………………………
……………………………………………………………………………..
26. (a) (i) Explain the term utility programs. (02 marks)
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………..
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………..
9
(b) (i) State three advantages of packaged software. (03 marks)
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………
……………………………………………………………………………..
……………………………………………………………………………
……………………………………………………………………………..
27. You have been given a task to network computers in a room. One of the
computers should be set up as a proxy server for other computers.
Describe the steps you would follow to set up the network. (20 marks)
28. (a) Explain any five technologies that have made business transactions
cheaper. (10 marks)
(b) Give five reasons that have led to slow adoption of technology in
Uganda. (10 marks)
29. (a) Describe the steps that can be taken to copy a file from a hard disk to a
flash disk. (10 marks)
(b) Explain the functions of any five hardware components of a computer
system unit. (10 marks)
10