Comp F2 MS
Comp F2 MS
Control the use of the main memory in storing data & information
Processing and manipulation of data into useful information
Manages execution of instructions
Give commands to all parts of the computer
Control the sequence of operations within the computer
2. State two ways of warm booting a computer.
Using the restart button
Press CTRL+ALT+DEL on the keyboard
Using the operating system command
3. Explain three ways in which a computer system can be used in electing a school captain.
Database for storing voters details.
Spreadsheet for analyzing data after voting process
Word processor for writing report, memos
Electronic voting system (biometric system) for voter’s registration.
- hardware configuration
- processor type and memory
- applications intended for the computer
- user friendliness
-available documentation such as user manuals and installation guides.
-the cost of the operating system. Some operating systems requirethe user to pay license fee while
others like linux are relatively free.
-network and data security provided by the operating system.
-number of processors and users supported by the operating system.
5. ROM (Read Only Memory) it is used to store programmed instruction and data permanently or
semi permanently.
Data and instruction stored in Rom are those required to remain uncharged for long period of time
RAM (Random Access Memory) its content can be read directly regardless of the sequence in which it
is stored.
Its content is held temporarily and if content lost, is lost once the computer is turned off.
6. Hard disk provides greater storage capacity than the floppy disk.
it is volatile.
Data can both be read and written in it.
It uses direct access method.
Its content is user defined.
11. situations when a computer user will be required to format a disk.
Address bus-this is a one way bus that carries the address of the next piece of instruction to be processed.
Data bus-this is a twos way bus that carries data signals to and from the microprocessor.
Control bus-it is a one way bus that carries command signals.
14. List three factors that determine the cost of a computer.
masked ROM
programmable read only memory (PROM)
erasable programmable read only memory ( EPROM)
electrically erasable read only memory(EEROM)
b) give three characteristics of ROM
provides permanent or semi-permanent storage of instructions and data from the manufacturer.
It is non volatile memory
It can only be read and not written to unless it is a special type of ROM
c) Name four components found in the System unit.
Hard drive
Motherboard
Cooling fan
Random access memory
Power supply
d) Explain the correct procedure for shutting down the computers in the computer
Laboratory. (4 marks)
1. Save all the work done on the computer, and close all programs that may be currently running.
2. Remove any floppy disk you might have inserted in the computer.
3. Follow the proper shut-down procedure required before switching off the computer.
For example;
To turn off any computer running Windows operating systems:
a). Click the Start button on the screen, then select Shut Down from the list.
b). In the prompt that appears, select Shut down, then press the Enter key on the keyboard.
c). After a few seconds, the message “It is now safe to turn off the computer” appears on the screen.
Switch off the System unit, then the Monitor.
17. a) Write the following abbreviations in full: (5 marks)
i) CPU- central processing unit
ii) ALU-Arithmetic logic unit
iii) RAM-Random access memory
iv) MICR-Magnetic ink character reader
v) OMR-optical mark reader
b) State four limitations of speech recognition devices found today.
a. Homophones-some words have same sounds
b. Word separation-each word must be followed by a short period of silence
c. Speaker variability-the speed, tone, accent, loudness and pronunciation of an individual speaker can
vary
d. Limited vocabulary understood and the number of speakers they can recognize
e. The response rate of these devices are still relatively slow
f. Speech input is complex to develop and is still at the early stages of development.
e) State three advantages of using a bar code reader.
i. They are very fast and accurate provided that the bar code has been printed clearly
ii. It is a cost saving method
iii. Saves time. The prices do not have to be attached to each item in the store because the details
are already held in a master file.
iv. Do not require special skills to operate
v. It improves customer convenience.
In addition, this rapid change in the computer technology makes computers & related facilities to become
outdated very fast, hence posing a risk of capital loss.
10) The emergence of computers has increased the rate of unemployment since they are now being used to
perform the jobs, which were done by human beings.
11) Computers have led to increase in computer crimes especially in Banks. The computer criminals steal large
amounts of funds belonging to various companies by transferring them out of their company accounts
illegally. In addition, they destroy vital data used in running the companies.
What is a computer laboratory?
A computer laboratory is a room that has been specially prepared to facilitate installation of computers and
to provide a safe conducive environment for teaching and learning of computer studies. The following
factors must be considered when preparing a computer laboratory.
State four factors to be considered when setting up a computer laboratory.
1. Security of computers, programs and other resources.
2. Reliability of the source of power.
3. The number of computers to be installed and the available floor space.
4. The maximum number of users that the laboratory can accommodate.
state four categories of keys on the key board.
Alphanumeric keys
Function keys
Cursor movement and editing keys
Special
PC operation keys
Numeric keypad keys
state five functions of the operating system.
Job
Job scheduling
Resource control and allocation
Input/output handling
Memory management
Error handling
Job sequencing
Interrupt handling
State four ways of identifying an illegal copy of an operating system
a. No license agreement
b. Prices are extremely cheap
c. No documentation manual
d. Frequent run-time or occurrence of fatal errors when using the machine
e. When one connects to the internet for authentication, the report from the
manufacturer indicates that the user may be a victim of counterfeit.
Give three details about a file that is stored by an operating system
File name
Date and time of creation
File size
File type
Storage location or path
List any three programs that always run in the background when a computer is started.
Antivirus
Time and date
Network connection
Volume control
State four major categories of computer hardware.
1. Input devices
2. Output devices
3. Storage devices
4. Central processing unit
In order to enable the control unit to carry out various functions, certain registers are used. Name
four major types of registers. (4 marks)
1. Sequence control register
2. Instruction register
3. Instruction decoder
4. Address register
5. System clock