0% found this document useful (0 votes)
21 views2 pages

Take Away Assignment

The document provides an overview of various computer-related topics, including features of word processors, formulas in spreadsheets, reasons for abnormal computer boot-ups, and methods for protecting data. It also discusses types of operating systems and file systems, as well as definitions of terms like trash, spam, and audit trails. Additionally, it highlights the importance of column breaks and line spacing in document formatting.

Uploaded by

Davy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views2 pages

Take Away Assignment

The document provides an overview of various computer-related topics, including features of word processors, formulas in spreadsheets, reasons for abnormal computer boot-ups, and methods for protecting data. It also discusses types of operating systems and file systems, as well as definitions of terms like trash, spam, and audit trails. Additionally, it highlights the importance of column breaks and line spacing in document formatting.

Uploaded by

Davy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Name:

Adm No:

Form:

1. Use of find and replace feature in Word processor


a. Find is used to locate a certain word within the document and Replace is used to
substitute a word it with another word.

2. The formula in f10 will be


=$A10*F$3
3. Reasons for abnormal boot up of the computer
a. Viruses infection
b. Faulty Hard Drive
c. Failure of Hardware components like Ram or Motherboard
d. Corrupt or improper installation of the Operating system

4. Examples of document readers:


a. WPS reader
b. Microsoft Word
c. Google Docs
d. Adobe Acrobat Reader

5. Why an impact printer is suitable for printing multiple copies


Impact Printers uses physical force to print. I,e they strike inked ribbons agains the printing
papers.

6. Ways of protecting Data and information against unauthorized access


a. Use of Passwords- It involves creating password security measures that requires one to
feed into the computer upon loging in to access the information in it
b. Use of Two factor Authentication- This involves setting a second verification step like
codes send via sms.

7. Reasons for Computer Flickering


a. Cables damages
b. Power problems
c. Monitor problems

8. a). Importance of column break in Word processor


a. Professional looking layouts
b. Improving readability

Name: Adm No:


b). Line spacing options in Ms-Word

FORMULA IN C10 FORMULA IN C15 a.


Single =A5*B5 =C10*D10 line
Spacing
=4*B$6 =4*D$6
b. Double line spacing

9.

10. a). Change- This feature replaces a text with a suggestion that is given
b). Ignore once- This enables skipping a word without changing it for just that time.

11. Types of embedded operating systems used in cell phones


a. Symbian Operating System
b. Android Operating System

12. Types of file systems used in Windows environment


a. New Technology File System
b. File allocation table

13. Meaning of terms


a. Trash-This is where deleted emails are kept.
b. Spam- This is an unwanted emails
c. Inbox-This is where received mails shows up

14. a). Audit trail- It keeps all records of activities performed in a computer
b). Data encryption- It converts data into human unreadable format and provides the recipient
only with access key
c).Passwords- It is used to grant access to a user to access a computer system.
d). Log files- They keeps detailed information about all activities and operations performed on a
computer or network system.

Name: Adm No:

You might also like