0% found this document useful (0 votes)
12 views14 pages

Abn Ass4 2022 Memo

This document is an assignment for a Diploma in Banking, Finance, and Credit course, specifically for the End User Computing module. It includes multiple-choice and true/false questions, structured questions, and sections on spreadsheets and PowerPoint, with a total of 100 marks. The assignment emphasizes the importance of presentation and critical thinking in addition to content.

Uploaded by

khomasnhies
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views14 pages

Abn Ass4 2022 Memo

This document is an assignment for a Diploma in Banking, Finance, and Credit course, specifically for the End User Computing module. It includes multiple-choice and true/false questions, structured questions, and sections on spreadsheets and PowerPoint, with a total of 100 marks. The assignment emphasizes the importance of presentation and critical thinking in addition to content.

Uploaded by

khomasnhies
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

COURSE: DIPLOMA IN BANKING, FINANCE AND CREDIT

MODULE: END USER COMPUTING


MODULE CODE: EUC100
ASSIGNMENT: 04
DUE DATE: 15 JULY 2022
TOTAL MARKS: 100
EXAMINER: MS PN LAZARUS
MODERATORS: Mr M. N. MBI

MEMORANDUM ASSIGNMENT 4

This question paper consists of Thirteen (13) pages including this cover
page

Instructions:

1. Work in an orderly way and present your work as neatly as possible.


2. While most of the marks will be awarded for content, candidates must bear in mind
the importance of presentation, i.e. insight and critical thinking.
3. Number your answers correctly and clearly.
4. Answer all questions.

1
SECTION A: MULTIPLE CHOOSE / TRUE AND FALSE QUESTIONS [30 MARKS]

1. Which of the following is NOT a DoS attack?

A. Server Spoofing

B. PIng Broadcast

C. Ping of Death

D. Smur

2. Random Access Memory or RAM is:

A. An external storage device

B. The computer long-term memory

C. The computer short-term memory

D. The memory that control the computer.

3. Too many programs running concurrently can slow down the computer, or cause it to
freeze.

A. True

B. False

4. The use of third party email services for official purposes may be permitted
discretionarily

A. True

B. False

2
5. A allows you to use several computers on a single Internet connection.

A. A server

B. A router

C. A USB

D. A PS/2 port

6. The following are password cracking software tool except?

A. HoneyMonkey

B. Cain and Abel

C. John the Ripper

D. Hashcat

7. Compressing a file enables you to store more information on your hard drive or send it
more quickly as an e-mail attachment.

A. True

B. False

8.

What is "Booting" your computer?

A. It is when you kick the computer out of the window

B. It is when you press the power button to turn your computer on. At the end of that
process, the operating system loads

C. It is when you shut down your computer

D. It is scanning your computer for viruses

9. Select three input devices your computer uses:

3
A. Mouse, keyboard, monitor

B. Mouse, keyboard, scanner

C. Mouse, printer, CPU

D. Mouse, scanner, printer

10. Sharing of user IDs or passwords is permitted with adequate justification.

A. True

B. False

11. It is impossible to save a Web page as a file on your computer.

A. True

B. False

12. Which of the following uses asymmetric key encryption?

A. AES

B. PGP

C. 3DES

D. RC5

13. Which of the two, is not an example of Windows Operating System

A. XP

B. MAC OS

C. Vista

D. Lynux Red Hat

4
14. A network cannot allow two or more computers to share an Internet connection,
printers, and files.

A. True

B. False

15. Which action below would breach the Clear Desk and Screen Policy?

A. Locking your computer when you are away from your desk

B. Leaving a departmental laptop on your desk when you are not using it or at the end
of the day

C. Locking confidential information in a cabinet

D. Both

16. An operating system that features windows, menus, buttons, scroll bars, icons and
wizards is called;

A. Ps2

B. USB

C. GUI

D. POST

17. No one body owns or controls the Internet except Google.

A. True

B. False

18. Which type of application is most commonly used for general bookkeeping tasks?

A. A database application.

B. A spreadsheet application.

5
C. A CAD application.

D. An e-mail application.

19. The responsibility of information security lies with the;

A. Chief Information Officer

B. All Employees

C. Board of Directors

D. Chief Risk Officer

20. The best way to prevent repetitive strain injury (RSI) is to:

A. Use a wrist rest to relieve pressure when you type.

B. Take regular breaks from your computer.

C. Use an ergonomic mouse.

D. Make sure that your monitor is well positioned.

21. What is the main function of the BIOS?

A. To conduct a “power-on self-test”

B. To manage non-responding programs

C. To fix any problem that may occur

D. To start the process of loading the operating system.

22. What statement best describes 'Hardware'?

A. It is tangible

B. You can touch it

C. It is the physical part of a computer system.

D. All of the above

6
23. Which one is not an input device?

A. Mouse

B. WiFi Modem

C. Microphone

D. Keyboard

24. A network site that appears to have valuable information but is isolated and monitored
is what kind of security measure?

A. Pseudo-network

B. Honeypot

C. Virtual Network

D. Canary Trap

25. A Bit represents:

A. Binary Digit

B. Binary Data

C. Binary Deci

D. None of the above

26. Which of the following is a storage device?

A. Hard Disk

B. USB Disk

C. Floppy Disk

D. All of the above

27. What type of device allows you to save your file and then take the file with you to access
on a different computer?

7
A. Jumpdrive, floppy disk, or memory card

B. Hard drive or mp3 player

C. Floppy disk or hard drive

D. Camera phone or hard drive

28. When keyboarding, all of the following are examples of good posture, EXCEPT:

A. Eyes on the monitor

B. Fingers on "home row."

C. Feet on the floor

D. Elbows on the table

29. Which of the followng is a collection of 1024 Bytes?

A. 1MB

B. 1KB

C. 1TB

D. 1GB

30. A group of independent computers attached to one another through communication


media.

A. Internet

B. E-mail

C. Network

D. All of the above

8
9
SECTION B: STRUCTURED QUSTIONS [10 MARKS]

Distinguish between the following

1. System software and application software [2 Marks]

2. File and folder [2 Marks]

3. Motherboard and computer case [2 Marks]

4. Internet service provider (ISP) and a world wide web (WWW) [2 Marks]

5. Random access Memory (RAM) and Ready Only Memory (ROM) [2 Marks]

SECTION C: SPREADSHEET [25 MARKS]

1. Explain what is Spreadsheet and its Basics. [2 Marks]

Spreadsheet can be compared to a paper ledger sheet. It consists of rows and columns and
their intersection called cells.

2. How many data formats are available in Excel? Name and explain 5 of them. [8 Marks]

There are eleven data formats available in Microsoft Excel for data Storage. Example:

Number – Stores data as a number

Currency – Stores data in the form of currency

Date – Data is stored as dates

Percentage – Stores numbers as a percentage

Text Formats – Stores data as string of texts

10
3. Specify the order of operations used for evaluating formulas in Excel. [4 Marks]

The order of operations in Microsoft Excel is same as in standard mathematics. It’s defined
by the term “PEMDAS” or “BEDMAS”.

Parentheses or Brackets

Exponent

Multiplication

Division

Addition

Subtraction

4. How can a user wrap the text within a cell? [2 Marks]

You must select the text you want to wrap, and then click wrap text from the home tab and
you can wrap the text within a cell.

5. Is it possible to prevent someone from copying the cell from your worksheet? [4 Marks]

Yes, it is possible. To protect your worksheet from getting copied, you need to go into Menu
bar >Review > Protect Sheet > Password. By entering a password, you can secure your
sheet from getting copied by others.

6. Explain pivot tables and its uses. [6 Marks]

A pivot table is a tool that allows for quick summarization of large data. It automatically
performs a sort, count, total or average of the data stored in the spreadsheet and displays
result in another spreadsheet. It saves a lot of time. Allows to link external data sources to
our Excel.

7. Outline the steps to following inserting rows and columns [2 Marks]

Insert tab – click table – select the number of rows and columns disired

11
SECTION D: POWERPOINT [25 MARKS]

1. What is PowerPoint? Why is it used? [4 Marks]

PowerPoint is a tool of Microsoft that is used to make presentations. It contains slides to


present the data. With the help of MS PowerPoint tool, you can represent your idea or plan
virtually using text, video, and images.

PowerPoint comes in MS Office Suite. It helps to represent the data in an attractive way by
allowing the user to add text, image, graphics, audio, and video in it.

2. How to protect a presentation by setting up a password on it? [6 Marks]

Set a password on a file to which you want to protect. Follow the below steps to set a
password:

File -> Info -> Protect Presentation -> Encrypt with Password

Open the file which you want to make password protected.

Go to File in the menu bar and click on the Info present at the left of the panel.

Here, click on the Protect Presentation dropdown menu under which you will get an option
Encrypt with Password. Click on it to protect the file with a password.

Create a password for the file. (It will ask two times to set a password.)

Now, file is password protected. It will ask for the password whenever you will open it.

3. Explain how transitions help to make the presentation attractive? [4 Marks]

MS PowerPoint offers several types of transitions, which makes the presentation attractive
and effective. When you add a transition on a slide, the slide changes in a different way
rather than simple.

Navigate to the Transition tab to get different transition options, such as split, fade, push,

12
clock, dissolve and many more. Choose any of the transitions and apply them to the slide.
You have to add transition on each slide individually.

4. Briefly explain how embed a chart of Excel to PowerPoint presentation? [6 Marks]

Follow the below steps to embed an Excel chart to PowerPoint presentation:

Open the presentation file and go to that slide where you insert an Excel chart.

Navigate to the Insert tab in menu bar.

Here, under the Text section, click on the Object.

A popup window will show you where mark the Create from file radio

Click on the browse to search the existing excel file on your device.

Select a file and click on the OK button to insert that excel file.

In the end, click on the OK button to close all the tabs.

5. What does motion path mean in PowerPoint? [2 Marks]

A motion path is a method of moving objects on a slide. PowerPoint allows its users to add
motion to an object in the slide. You can add motion to an object from the Animation tab by
selecting an object.

6. How to add a motion path? [3 Marks]

Select the text or image on which you want to apply the motion path.

Go to the Animation tab in menu bar.

Click on the Add Animation with your object.

Scroll down and click on the more motion paths. Here you will get 40+ motion path
animations.

Choose one of them and click on OK to apply it with your selected object

13
-------------------------------------------------------END--------------------------------------------------------

14

You might also like