COURSE WORK
Group one
1. Discuss the different types of Random Access Memory (RAM)
2. Define the following computer concepts/terms:
I. Information Technology (IT)
II. Motherboard
III. Smartphone
IV. Teleworking
V. Spooling
Group two
3. State the difference between impact printers and non-impact printers?
4. Compare and contrast the features of CRT (Cathode Ray Tube)
Monitors and liquid crystal displays (LCD) monitors?
Group Three
5. Discuss two ways to measure the performance of a hard disk
a) Using any internet resource of your choice, write about the following:
i) History of Computing.
ii) Origin of the World Wide Web.
iii) Origin of the internet.
b) Briefly explain how the internet manages to span across the entire world?
c) Define an ISP and give examples of ISPs in Uganda. Give some reasons why you would
choose one ISP over the other.
d) Discuss internet crimes that are commonly committed by users over the internet and how
they can be solved.
e) What is internet topology, Types of internet topology and their merits and demerits?
f) Requirements for connecting to the internet.
Group four
1. Briefly explain term computer generation, with examples also the give the
characteristics of each generation.
2. With relevant examples, List and explain the computer classifications.
Include even their characteristics.
Group five
1. Define the term data Backup as in computing.
2. Give the reasons why data backup is needed.
3. Types of data backup
4. Give the best practices for data backup
5. Data backup tools
Group six
1. What is email
2. Explain the features of email
3. Explain the parts of an email
4. List and the explain the search engines you know.
Group seven
What is an operating system?
List and explain the types of an operating system
Outline the function of an operating system
Group 8
1. What is internet security and explain its concept.
2. List and the explain the types of internet security.
3. Give the some of ethical issues in internet security
4. Define the term cyber law and give its advantages
GROUP 9
1. How do you create a strong password to protect online accounts?
2. What are the signs of a computer virus, and how can you protect against it?
3. How would you back up important files to prevent data loss?
4. Why is it important to update your computer’s operating system regularly
Group 10
1. What are the main components of a computer system, and how do they interact to
perform computing tasks?
2. Explain the difference between hardware and software, providing at least three
examples of each.
3. Describe the role of an operating system in managing computer resources and
facilitating user interaction.
4. What are the key differences between a desktop computer, a laptop, and a tablet in
terms of functionality and use cases?
Group 11
1. Explain the process of creating a table of contents in Microsoft Word, including how
to update it when document content changes.
2. What are the benefits and limitations of using cloud-based productivity tools like
Google Docs compared to locally installed software like Microsoft Office?
3. Describe how to create and format a spreadsheet in Microsoft Excel, including the use
of formulas and cell references.
4. Discuss the key features of presentation software like Microsoft PowerPoint and how
they can be used to create an effective presentation.
Group 12
1. What is the difference between a web browser and a search engine, and how do they
work together to access online content?
2. Describe the process of setting up and managing an email account, including how to
send, receive, and organize emails.
3. What are the security risks associated with public Wi-Fi networks, and what
precautions can users take to protect their data?
4. Discuss the role of social media platforms in professional communication and the
potential risks of sharing personal information online
Group 13
1. What is malware, and what are the differences between viruses, worms, and
ransomware in terms of their behavior and impact?
2. Explain the importance of strong passwords and describe the characteristics of a
secure password.
3. How does two-factor authentication enhance the security of online accounts, and what
are some common methods used for the second factor?
4. Discuss the purpose of a firewall and how it helps protect a computer or network from
unauthorized access.
5. What are phishing attacks, and what strategies can users employ to identify and avoid
them?
Group 14
1. What is encryption, and how does it protect sensitive data during transmission over
the internet?
2. Explain the differences between antivirus software and anti-malware tools, and why
both might be necessary.
3. Describe the steps to recover a compromised online account, including enabling
account recovery options.
4. What are the risks of using outdated software, and how can users ensure their systems
remain secure?
GROUP 15
1. What are the primary functions of a computer's CPU, and how does its clock speed
impact performance?
2. Explain the differences between RAM and ROM, including their roles in a computer
system.
3. Describe the process of connecting and configuring a printer to a computer, including
troubleshooting common connection issues.
4. What are the advantages and disadvantages of using solid-state drives (SSDs)
compared to traditional hard disk drives (HDDs)?
5. Discuss the purpose of peripheral devices like scanners and webcams, and how they
integrate with a computer system.
Group 15
1. What is the difference between a LAN and a WAN, and how are they used in
different environments?
2. Explain the role of an IP address in network communication and the difference
between IPv4 and IPv6.
3. Describe how a router functions in a home network and the steps to configure its basic
settings.
4. What is the purpose of a VPN, and how does it enhance security for remote network
access?
5. Discuss the concept of bandwidth and how it affects the performance of internet-
based applications.