COURSE: DIPLOMA IN BANKING, FINANCE AND CREDIT
MODULE: END USER COMPUTING
MODULE CODE: EUC100
ASSIGNMENT: 04
DUE DATE: 15 JULY 2022
TOTAL MARKS: 100
EXAMINER: MS PN LAZARUS
MODERATORS: Mr M. N. MBI
MEMORANDUM ASSIGNMENT 4
This question paper consists of Thirteen (13) pages including this cover
page
Instructions:
1. Work in an orderly way and present your work as neatly as possible.
2. While most of the marks will be awarded for content, candidates must bear in mind
the importance of presentation, i.e. insight and critical thinking.
3. Number your answers correctly and clearly.
4. Answer all questions.
1
SECTION A: MULTIPLE CHOOSE / TRUE AND FALSE QUESTIONS [30 MARKS]
1. Which of the following is NOT a DoS attack?
A. Server Spoofing
B. PIng Broadcast
C. Ping of Death
D. Smur
2. Random Access Memory or RAM is:
A. An external storage device
B. The computer long-term memory
C. The computer short-term memory
D. The memory that control the computer.
3. Too many programs running concurrently can slow down the computer, or cause it to
freeze.
A. True
B. False
4. The use of third party email services for official purposes may be permitted
discretionarily
A. True
B. False
2
5. A allows you to use several computers on a single Internet connection.
A. A server
B. A router
C. A USB
D. A PS/2 port
6. The following are password cracking software tool except?
A. HoneyMonkey
B. Cain and Abel
C. John the Ripper
D. Hashcat
7. Compressing a file enables you to store more information on your hard drive or send it
more quickly as an e-mail attachment.
A. True
B. False
8.
What is "Booting" your computer?
A. It is when you kick the computer out of the window
B. It is when you press the power button to turn your computer on. At the end of that
process, the operating system loads
C. It is when you shut down your computer
D. It is scanning your computer for viruses
9. Select three input devices your computer uses:
3
A. Mouse, keyboard, monitor
B. Mouse, keyboard, scanner
C. Mouse, printer, CPU
D. Mouse, scanner, printer
10. Sharing of user IDs or passwords is permitted with adequate justification.
A. True
B. False
11. It is impossible to save a Web page as a file on your computer.
A. True
B. False
12. Which of the following uses asymmetric key encryption?
A. AES
B. PGP
C. 3DES
D. RC5
13. Which of the two, is not an example of Windows Operating System
A. XP
B. MAC OS
C. Vista
D. Lynux Red Hat
4
14. A network cannot allow two or more computers to share an Internet connection,
printers, and files.
A. True
B. False
15. Which action below would breach the Clear Desk and Screen Policy?
A. Locking your computer when you are away from your desk
B. Leaving a departmental laptop on your desk when you are not using it or at the end
of the day
C. Locking confidential information in a cabinet
D. Both
16. An operating system that features windows, menus, buttons, scroll bars, icons and
wizards is called;
A. Ps2
B. USB
C. GUI
D. POST
17. No one body owns or controls the Internet except Google.
A. True
B. False
18. Which type of application is most commonly used for general bookkeeping tasks?
A. A database application.
B. A spreadsheet application.
5
C. A CAD application.
D. An e-mail application.
19. The responsibility of information security lies with the;
A. Chief Information Officer
B. All Employees
C. Board of Directors
D. Chief Risk Officer
20. The best way to prevent repetitive strain injury (RSI) is to:
A. Use a wrist rest to relieve pressure when you type.
B. Take regular breaks from your computer.
C. Use an ergonomic mouse.
D. Make sure that your monitor is well positioned.
21. What is the main function of the BIOS?
A. To conduct a “power-on self-test”
B. To manage non-responding programs
C. To fix any problem that may occur
D. To start the process of loading the operating system.
22. What statement best describes 'Hardware'?
A. It is tangible
B. You can touch it
C. It is the physical part of a computer system.
D. All of the above
6
23. Which one is not an input device?
A. Mouse
B. WiFi Modem
C. Microphone
D. Keyboard
24. A network site that appears to have valuable information but is isolated and monitored
is what kind of security measure?
A. Pseudo-network
B. Honeypot
C. Virtual Network
D. Canary Trap
25. A Bit represents:
A. Binary Digit
B. Binary Data
C. Binary Deci
D. None of the above
26. Which of the following is a storage device?
A. Hard Disk
B. USB Disk
C. Floppy Disk
D. All of the above
27. What type of device allows you to save your file and then take the file with you to access
on a different computer?
7
A. Jumpdrive, floppy disk, or memory card
B. Hard drive or mp3 player
C. Floppy disk or hard drive
D. Camera phone or hard drive
28. When keyboarding, all of the following are examples of good posture, EXCEPT:
A. Eyes on the monitor
B. Fingers on "home row."
C. Feet on the floor
D. Elbows on the table
29. Which of the followng is a collection of 1024 Bytes?
A. 1MB
B. 1KB
C. 1TB
D. 1GB
30. A group of independent computers attached to one another through communication
media.
A. Internet
B. E-mail
C. Network
D. All of the above
8
9
SECTION B: STRUCTURED QUSTIONS [10 MARKS]
Distinguish between the following
1. System software and application software [2 Marks]
2. File and folder [2 Marks]
3. Motherboard and computer case [2 Marks]
4. Internet service provider (ISP) and a world wide web (WWW) [2 Marks]
5. Random access Memory (RAM) and Ready Only Memory (ROM) [2 Marks]
SECTION C: SPREADSHEET [25 MARKS]
1. Explain what is Spreadsheet and its Basics. [2 Marks]
Spreadsheet can be compared to a paper ledger sheet. It consists of rows and columns and
their intersection called cells.
2. How many data formats are available in Excel? Name and explain 5 of them. [8 Marks]
There are eleven data formats available in Microsoft Excel for data Storage. Example:
Number – Stores data as a number
Currency – Stores data in the form of currency
Date – Data is stored as dates
Percentage – Stores numbers as a percentage
Text Formats – Stores data as string of texts
10
3. Specify the order of operations used for evaluating formulas in Excel. [4 Marks]
The order of operations in Microsoft Excel is same as in standard mathematics. It’s defined
by the term “PEMDAS” or “BEDMAS”.
Parentheses or Brackets
Exponent
Multiplication
Division
Addition
Subtraction
4. How can a user wrap the text within a cell? [2 Marks]
You must select the text you want to wrap, and then click wrap text from the home tab and
you can wrap the text within a cell.
5. Is it possible to prevent someone from copying the cell from your worksheet? [4 Marks]
Yes, it is possible. To protect your worksheet from getting copied, you need to go into Menu
bar >Review > Protect Sheet > Password. By entering a password, you can secure your
sheet from getting copied by others.
6. Explain pivot tables and its uses. [6 Marks]
A pivot table is a tool that allows for quick summarization of large data. It automatically
performs a sort, count, total or average of the data stored in the spreadsheet and displays
result in another spreadsheet. It saves a lot of time. Allows to link external data sources to
our Excel.
7. Outline the steps to following inserting rows and columns [2 Marks]
Insert tab – click table – select the number of rows and columns disired
11
SECTION D: POWERPOINT [25 MARKS]
1. What is PowerPoint? Why is it used? [4 Marks]
PowerPoint is a tool of Microsoft that is used to make presentations. It contains slides to
present the data. With the help of MS PowerPoint tool, you can represent your idea or plan
virtually using text, video, and images.
PowerPoint comes in MS Office Suite. It helps to represent the data in an attractive way by
allowing the user to add text, image, graphics, audio, and video in it.
2. How to protect a presentation by setting up a password on it? [6 Marks]
Set a password on a file to which you want to protect. Follow the below steps to set a
password:
File -> Info -> Protect Presentation -> Encrypt with Password
Open the file which you want to make password protected.
Go to File in the menu bar and click on the Info present at the left of the panel.
Here, click on the Protect Presentation dropdown menu under which you will get an option
Encrypt with Password. Click on it to protect the file with a password.
Create a password for the file. (It will ask two times to set a password.)
Now, file is password protected. It will ask for the password whenever you will open it.
3. Explain how transitions help to make the presentation attractive? [4 Marks]
MS PowerPoint offers several types of transitions, which makes the presentation attractive
and effective. When you add a transition on a slide, the slide changes in a different way
rather than simple.
Navigate to the Transition tab to get different transition options, such as split, fade, push,
12
clock, dissolve and many more. Choose any of the transitions and apply them to the slide.
You have to add transition on each slide individually.
4. Briefly explain how embed a chart of Excel to PowerPoint presentation? [6 Marks]
Follow the below steps to embed an Excel chart to PowerPoint presentation:
Open the presentation file and go to that slide where you insert an Excel chart.
Navigate to the Insert tab in menu bar.
Here, under the Text section, click on the Object.
A popup window will show you where mark the Create from file radio
Click on the browse to search the existing excel file on your device.
Select a file and click on the OK button to insert that excel file.
In the end, click on the OK button to close all the tabs.
5. What does motion path mean in PowerPoint? [2 Marks]
A motion path is a method of moving objects on a slide. PowerPoint allows its users to add
motion to an object in the slide. You can add motion to an object from the Animation tab by
selecting an object.
6. How to add a motion path? [3 Marks]
Select the text or image on which you want to apply the motion path.
Go to the Animation tab in menu bar.
Click on the Add Animation with your object.
Scroll down and click on the more motion paths. Here you will get 40+ motion path
animations.
Choose one of them and click on OK to apply it with your selected object
13
-------------------------------------------------------END--------------------------------------------------------
14