Full Answer Final Exam
Full Answer Final Exam
B.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
TRUE
TRUE
TRUE
TRUE
FALSE
TRUE
TRUE
TRUE
FALSE
TRUE
(26)network
(30)star
(28)cable
Page 1 of 6
29. A network topology refers to the layout of the computers and devices
in a communication network.
30. On a star network, if one node fails, only that node is affected.
The other nodes continue to operate normally.
Questions 31 40 :Look at the pictures below. Then, write the number in the
correct box to match with the correct devices.
Number
39
40
38
36
32
Page 2 of 6
Name
Card Reader / Writer
Digital Camera
External Hard Disk
Keyboard
Speaker
Number
37
34
35
31
33
Name
Mouse
Scanner
USB Flaash Drive
Printer
Monitor
Page 3 of 6
SECTION B
QUESTION 1 (10 MARKS)
Fill in the blanks the differences between computerized and non-computerised
system into the appropriate column based on the aspects given
Computerised
Aspect
Task
Time
Interesting
Productivity
Profit
Non-computerised
QUESTION 2 (10MARKS)
2.
a) Define computer system
A case that contains electronic components of the computer used to process
data.
( 2 marks )
b) State the meaning of input, processor, output and storage.
Input Any data and instruction entered into the memory of the computer.
Proccesor Electronic component on a computers motherboard that interprets
and carries out the basic instructions that operate the computer. Also called CPU
or central processing unit.
Output Data that has been processed into a useful form.
Storage Location in which data, instruction and information are held for future
use.
( 4 marks )
c) Draw a block diagram and describe the information processing cycle which includes input,
process,
output and storage.
Processor
Storage
Page 4 of 6
Output
BLOCK DIAGRAM
(4
marks )
QUESTION 3
4.Figure below shown three types of network topologies.
a) Name the network topology in the box below.( 2 marks)
Page 5 of 6
(2
a)
Describe briefly the types of security systems you have to consider in managing
the system.
b)
Scheme of marking
-
Computer security means protecting our computer system and the information they contain against
unwanted access, damage, destruction or unwanted modification.
i)
ii)
Page 6 of 6
iii)
Software and data security refers to the security measures used to protect the
software and the loss of data files. Examples- activation code and serial number.
iv)