Name:
Adm No:
Form:
1. Use of find and replace feature in Word processor
a. Find is used to locate a certain word within the document and Replace is used to
substitute a word it with another word.
2. The formula in f10 will be
=$A10*F$3
3. Reasons for abnormal boot up of the computer
a. Viruses infection
b. Faulty Hard Drive
c. Failure of Hardware components like Ram or Motherboard
d. Corrupt or improper installation of the Operating system
4. Examples of document readers:
a. WPS reader
b. Microsoft Word
c. Google Docs
d. Adobe Acrobat Reader
5. Why an impact printer is suitable for printing multiple copies
Impact Printers uses physical force to print. I,e they strike inked ribbons agains the printing
papers.
6. Ways of protecting Data and information against unauthorized access
a. Use of Passwords- It involves creating password security measures that requires one to
feed into the computer upon loging in to access the information in it
b. Use of Two factor Authentication- This involves setting a second verification step like
codes send via sms.
7. Reasons for Computer Flickering
a. Cables damages
b. Power problems
c. Monitor problems
8. a). Importance of column break in Word processor
a. Professional looking layouts
b. Improving readability
Name: Adm No:
b). Line spacing options in Ms-Word
FORMULA IN C10 FORMULA IN C15 a.
Single =A5*B5 =C10*D10 line
Spacing
=4*B$6 =4*D$6
b. Double line spacing
9.
10. a). Change- This feature replaces a text with a suggestion that is given
b). Ignore once- This enables skipping a word without changing it for just that time.
11. Types of embedded operating systems used in cell phones
a. Symbian Operating System
b. Android Operating System
12. Types of file systems used in Windows environment
a. New Technology File System
b. File allocation table
13. Meaning of terms
a. Trash-This is where deleted emails are kept.
b. Spam- This is an unwanted emails
c. Inbox-This is where received mails shows up
14. a). Audit trail- It keeps all records of activities performed in a computer
b). Data encryption- It converts data into human unreadable format and provides the recipient
only with access key
c).Passwords- It is used to grant access to a user to access a computer system.
d). Log files- They keeps detailed information about all activities and operations performed on a
computer or network system.
Name: Adm No: