Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
SOFTWARE
CD-ROM, monitor, printer, video card, scanners , Quickbooks, Adobe Acrobat, WhatsApp , Internet
label makers, routers , and modems.
Explorer , Microsoft Word , Microsoft Excel
Hardware serves as the delivery system for
software solutions. The hardware of a computer is
infrequently changed, in comparison with
software and data, which are soft in the sense
that they are readily created, modified, or erased
on the computer
Hardware failure is random. Hardware does have Software failure is systematic. Software does not
increasing failure at the last stage.
have an increasing failure rate.
Hardware wears out over time.
Page 2 of 87
rmmakaha@gmail.com
While information technology may have made the world a global village, it has also
contributed to one culture dominating another weaker one. For example it is now argued
that US influences how most young teenagers all over the world now act,
QUESTION 2
a) Write short notes on the following devices:
i.
A central processing unit (CPU) is the electronic circuitry within a computer that carries out the
instructions of a computer program by performing the basic arithmetic, logical, control and
input/output (I/O) operations specified by the instructions
It processes instructions that it gathers from decoding the code in programs and other such files.
A CPU has four primary functions: fetch, decode, execute, and write back
ii.
The control unit (CU) is a component of a computer's central processing unit (CPU) that
directs operation of the processor.
It tells the computer's memory, arithmetic/logic unit and input and output devices how to
respond to a program's instructions.
It directs the operation of the other units by providing timing and control signals.
Page 3 of 87
rmmakaha@gmail.com
iii.
A computer keyboard is an input device that allows a person to enter symbols like
letters and numbers into a computer. It is the main input device for most computers.
There are different types of keyboards. The most popular type is the QWERTY design,
which is based on typewriter keyboards.
Keyboard is the most common and very popular input device which helps in inputting
data to the computer. The layout of the keyboard is like that of traditional typewriter,
although there are some additional keys provided for performing additional functions.
Keyboards are of two sizes 84 keys or 101/102 keys, but now keyboards with 104 keys or
108 keys are also available for Windows and Internet.
iv.
Modem [3]
v.
Keyboard [3]
A light pen is a computer input device in the form of a light-sensitive wand used in
conjunction with a computer's CRT display.
Page 4 of 87
rmmakaha@gmail.com
It allows the user to point to displayed objects or draw on the screen in a similar way to a
touchscreen but with greater positional accuracy.
A light pen can work with any CRT-based display and other display technologies,
A light pen detects a change of brightness of nearby screen pixels when scanned by
cathode ray tube electron beam and communicates the timing of this event to the
computer. Since a CRT scans the entire screen one pixel at a time, the computer can keep
track of the expected time of scanning various locations on screen by the beam and infer
the pen's position from the latest timestamp.
LIGHT PEN
Light pen is a pointing device which is similar to a pen. It is used to select a displayed
menu item or draw pictures on the monitor screen. It consists of a photocell and an
optical system placed in a small tube. When the tip of a light pen is moved over the
monitor screen and pen button is pressed, its photocell sensing element detects the screen
location and sends the corresponding signal to the CPU.
Joystick
Joystick is also a pointing device which is used to move cursor position on a monitor screen. It is
a stick having a spherical ball at its both lower and upper ends. The lower spherical ball moves in
a socket. The joystick can be moved in all four directions.
The function of joystick is similar to that of a mouse. It is mainly used in Computer Aided
Designing (CAD) and playing computer games.
Touchscreen
A touchscreen is a monitor or other flat surface with a sensitive panel directly on the screen that
registers the touch of a finger as an input. Instead of being touch-sensitive, some touchscreens use
beams across the screen to create a grid that senses the presence of a finger.
A touchscreen allows the user to interact with a device without a mouse or keyboard and is used
with smartphones, tablets, computer screens, and information kiosks.
ii.
Bar Code Reader is a device used for reading bar coded data (data in form of light and dark lines).
Bar coded data is generally used in labeling goods, numbering the books etc. It may be a hand
held scanner or may be embedded in a stationary scanner. Bar Code Reader scans a bar code
image, converts it into an alphanumeric value which is then fed to the computer to which bar code
reader is connected.
A barcode reader, also called a price scanner or point-of-sale ( POS ) scanner, is a hand-held or
stationary input device used to capture and read information contained in a bar code . A barcode
reader consists of a scanner , a decoder (either built-in or external), and a cable used to connect
the reader with a computer. Because a barcode reader merely captures and translates the barcode
into numbers and/or letters, the data must be sent to a computer so that a software application can
make sense of the data. Barcode scanners can be connected to a computer through a serial port ,
keyboard port , or an interface device called a wedge . A barcode reader works by directing a
beam of light across the bar code and measuring the amount of light that is reflected back. (The
dark bars on a barcode reflect less light than the white spaces between them.) The scanner
converts the light energy into electrical energy, which is then converted into data by the decoder
and forwarded to a computer.
MICR input device is generally used in banks because of a large number of cheques to be
processed every day. The bank's code number and cheque number are printed on the cheques with
a special type of ink that contains particles of magnetic material that are machine readable. This
reading process is called Magnetic Ink Character Recognition (MICR). The main advantage of
MICR is that it is fast and less error prone.
Page 6 of 87
rmmakaha@gmail.com
QUESTION 3
Outline any 5 data storage devices and how they work. [25]
Magnetic storage devices
Today, magnetic storage is one of the most common types of storage used with computers and is
the technology that many computer hard drives use.
Floppy diskette
Hard drive
Magnetic strip
SuperDisk
Tape cassette
Zip diskette
Blu-ray disc
CD-ROM disc
CD-R and CD-RW disc
DVD-R, DVD+R, DVD-RW, and DVD+RW disc
Cloud storage
Network media
Paper storage
Page 7 of 87
rmmakaha@gmail.com
OMR
Punch card
Many possible RAID configurations are available. The first is called "RAID 0". This divides or
"strips" the data in a storage volume across two or more disks, with half of each file written to
one disk, and half to another. This improves overall read/write performance without sacrificing
capacity. So, for example (as shown above), two 1TB drives may be linked to form a 2TB array.
Because this virtual volume is faster than either of its component disks, RAID 0 is common used
on video editing workstations.
Page 8 of 87
rmmakaha@gmail.com
Flash memory cards were developed as a storage media for digital cameras and mobile
computers. They consist of a small plastic package with a contact array that slots into a camera
or other mobile computing device, or an appropriate memory card reader. Such readers usually
have several slots (to accommodate the various formats of flash memory cards now available),
and can either be integrated into a desktop computer or laptop's case, or connected via a USB
port as an external hardware unit. In addition to still and video digital cameras, many mobile
phones, tablets, netbooks, media players, audio recorders and televisions now also have slots for
reading and writing a flash memory card.
The capacity of flash memory cards on the market currently ranges from 8MB to 64GB. There
are also six major card formats, each with its own type of card slot. The most common format is
the secure digital or SD card (see below). Next most popular are compact flash (CF) cards,
which were the first popular format introduced, and which are used by many professional digital
cameras and audio recorders. Finally come Sony's Memory stick format (and not to be confused
with a USB memory stick), the multi-media card (MMC) and the xD picture card (XD card).
Adapters are available to allow a compact flash card to be connected to a computer's
motherboard instead of a hard disk, and these are becoming popular on small-format computers
running the Linux operating system. As another aside, Panasonic have their own video recording
flash memory card format called the P2 card. This is internally based on four high-speed SD
cards, currently available in 16, 32 or 64GB capacities, and is used instead of tape on some
professional video equipment. In April 2007, Sandisk and Sony also released an alternative flash
memory card format -- the SxS card -- currently also available in 16, 32 and 64GB capacities.
This said, even in professional video, compact flash and even SD cards are becoming the
dominant recording media.
SD CARDS
SD cards are as noted above the most popular flash memory cards now on the market, and come
in so many variants that they do require some explanation. For a start, SD cards come in three
physical sizes. These comprise standard-size SD cards (first developed in 1999), smaller mini
SD cards (introduced on some mobile phones in 2003), and the even smaller micro SD cards.
The latter were invented in 2005 and are becoming increasingly popular on smartphones and
Page 10 of 87
rmmakaha@gmail.com
Page 12 of 87
rmmakaha@gmail.com
QUESTION 4
a) Differentiate between primary and secondary computer
memory.[15]
The following table list out some of the key differences between the primary and secondary
memory:
PRIMARY MEMORY
SECONDARY MEMORY
Page 13 of 87
rmmakaha@gmail.com
RAM
ROM
RAM is faster
Page 14 of 87
rmmakaha@gmail.com
Options
RAM
ROM
Elaboration
Accessibility
Working type
Storage
Speed
Data
preserving
structure
Cost
Chip size
Types
Page 15 of 87
rmmakaha@gmail.com
QUESTION 5
a) Define the term network and outline the types of computer
networks.[10]
Page 16 of 87
rmmakaha@gmail.com
LANs connect to WANs, such as the internet, using routers to transfer data and information
quickly and securely. WANs are usually too large to be controlled by one administrator, and so
usually have collective ownership, or in the case of the internet, is publicly owned.
Page 17 of 87
rmmakaha@gmail.com
Page 18 of 87
rmmakaha@gmail.com
Intranet
Extranet
It is a Global system of
interconnected computer
network.
It is a Private network
specific to an
organisation.
It is regulated by an
organization.
It is regulated by multiple
organization.
It is largest in terms of
number of connected
devices.
It is owned by no one.
It is owned by single
organization.
It is owned by single/multiple
organization.
It is means of sharing
information throughout
the world.
It is means of sharing
sensitive information
throughout organization.
Security is dependent of
the user of device
connected to network.
Internet is unregulated
and uncensored.
Page 19 of 87
rmmakaha@gmail.com
Page 20 of 87
rmmakaha@gmail.com
Page 21 of 87
rmmakaha@gmail.com
Headers and Footers: option of creating standard blocks of text that will automatically
appear at the top or bottom of each page in a document.
Footnoting: automatic sequential numbering of footnotes and positioning of the footnotes at
the bottom of their appropriate pages during pagination.
Table of Contents and Index Generators. Programs that create these based on the text of a
document.
Mail Merge: automatic combining of a form letter with a mailing list to generate multiple
copies of the letter with the different addresses and other variable information filled in.
Automatic Spelling Checker and Corrector. Program that compares words in the text
against an on-line dictionary, flagging items not found in the dictionary and offering
alternative spellings and a means of correcting the errors.
PowerPoint provides basic slide templates such as schedules and diagrams and offers readymade themes with professional images, font groups and preselected color schemes.
PowerPoint has its own library of shapes and objects, and users can create custom charts and
graphs to share data with an audience.
Users can also apply different backgrounds to slides and insert their own diagrams and
pictures.
Basic grammar and spell-checking tools.
USES OF POWERPOINT
Guided Presentations
Self-Running Presentations
Recorded Videos
Use PowerPoint to Make Tutorials
Use PowerPoint Presentations as a Digital Portfolio
Prepare nice Animations using PowerPoint
Page 24 of 87
rmmakaha@gmail.com
QUESTION 2
Identify any five social networking facilities and explain how
individuals and organizations can benefit from them. [25]
FIVE SOCIAL NETWORKING FACILITIES
Social Networking Facilities use web-based and mobile technologies on smartphones and
tablet computers to create highly interactive platforms through which individuals,
communities and organizations can share, co-create, discuss, and modify user-generated
content or pre-made content posted online.
They introduce substantial and pervasive changes to communication between businesses,
organizations, communities, and individuals.
Social Networking Facilities changes the way individuals and large organizations
communicate.
These changes are the focus of the emerging field of technoself studies.
Social Networking Facilities differ from paper-based or traditional electronic media such
as TV broadcasting in many ways, including quality, reach, frequency, usability,
immediacy, and permanence.
Social Networking Facilities operate in a dialogic transmission system (many sources to
many receivers).
This is in contrast to traditional media that operates under a monologic transmission
model (one source to many receivers), such as a paper newspaper which is delivered to
many subscribers. Some of the most popular Social Networking Facilities are:
1. WhatsApp
2. Facebook
3. Twitter
4. LinkedIn
5. Instagram
6. YouTube
7. Google+
8. Pinterest
9. Tumblr,
10. Viber
11. Snapchat
Page 27 of 87
rmmakaha@gmail.com
QUESTION 3
Explain what a computer virus is and describe how viruses affect
the operation of a computer and suggest ways of minimizing or
eliminating the effects of computer viruses. [25]
Computer virus
An executable computer program written intentionally to alter the way a computer
operates without permission, to do harm to the computer.
A virus is a computer program designed to enter your computer and tamper with your files
without your knowledge. Once the program containing the virus is open, the activated virus can
not only infect other programs and documents on your computer, it can duplicate and transmit
itself to other computers that are connected to yours, just like a physical virus can move from one
human host to another.
Install a reliable anti virus program From the first moment you turn your computer
on, you should have a trusted anti virus program by your side. Even if you have a
machine that isnt hooked up to the Internet, a reliable anti virus program is a low cost
and common sense addition to any machine. There are even free anti virus programs you
can download that work almost as well as industry giants like Norton and McAfee.
Install anti-spyware and anti-malware programs As good as the best anti virus
programs are, they sometimes need a little bit of help. Thankfully, many of the top antispyware programs are completely free. Spybot Search and Destroy and CCleaner are just
two free programs that can help prevent computer viruses from doing any damage on
your machine. As helpful as these programs are, however, you must update them and run
them on a regular basis for them to do any good.
Avoid suspicious websites A good virus protection program will alert you when you
Page 29 of 87
rmmakaha@gmail.com
visit a website that attempts to install or run a program on your computer. Many less than
reputable adult websites do this, so if you get a warning, dont go back, you may end up
with a bug you cant get rid of.
Never Open Email Attachments Without Scanning Them First The most common
way viruses are spread throughout the Internet is still via email. Some attachments, like
pictures, now display in emails and dont require an attachment to be manually opened,
but other documents do. Make sure you use an email client that scans all email
attachments before you are allowed to open them. This will help prevent computer
viruses from getting a foothold on your machine.
Set up Automatic Scans Many of the top anti virus programs, as well as the best antispyware programs, now have settings that will let them automatically run during down
times or in the middle of the night. Of course, your computer must be on for this to
happen, but having daily scans run when nothing else is going on is a great way to
prevent even the latest computer viruses from sticking around too long.
Watch Your Downloads Part of the fun of the Internet is downloading music, movies
and other items. However, since these downloads are so massive, it can be easy to sneak
a virus along for the ride. Only download these files from trusted sites that you can count
on, or, at the very least, scan them before you open them.
Updates, Updates, Updates There is a reason why Windows has a feature called
Critical Updates. There is an entire branch of Microsoft dedicated to staying one step
ahead of the hackers out there so when they manage to fix a possible security loophole,
you need to download the patch right away. Help Microsoft help you prevent computer
viruses from causing too much trouble.
Know What To Look For Even if you are just a casual computer user, you should
have an idea of how your machine operates, what normal pop up windows look like and
what popular viruses are out there, that way, when your computer begins exhibiting tell
tale signs, youll know. You can help prevent computer viruses by staying updated and
educated.
Stay Away From Cracked Software It is so secret that you can download illegal,
cracked versions of some programs online. As tempting as it may be, these files are
almost always infested with advanced and difficult to detect bugs. Play it safe and get
your software from the source.
Install a Firewall A firewall is a program that screens incoming Internet and network
traffic. Along with your virus program, it can help prevent unauthorized access to your
computer.
Be prepared to Lock Down If you hear of a virus that is spreading like wildfire
through the Internet, make an extra effort to be careful. Dont open any suspicious emails
or accept any downloads for a week or two until your virus protection program has been
updated and you are, once again, safe.
Page 30 of 87
rmmakaha@gmail.com
QUESTION 4
Briefly describe the functions of the following parts of a computer
a) CPU [5]
The central processing unit (CPU) of a computer is a piece of hardware that carries out
the instructions of a computer program.
It performs the basic arithmetical, logical, and input/output operations of a computer
system.
The CPU is like the brains of the computer - every instruction, no matter how simple, has
to go through the CPU.
So let's say you press the letter 'k' on your keyboard and it appears on the screen - the
CPU of your computer is what makes this possible
The Four Primary Functions of the CPU
The CPU processes instructions it receives in the process of decoding data. In processing
this data, the CPU performs four basic steps:
1. Fetch Each instruction is stored in memory and has its own address. The processor takes
this address number from the program counter, which is responsible for tracking which
instructions the CPU should execute next.
2. Decode All programs to be executed are translated to into Assembly instructions.
Assembly code must be decoded into binary instructions, which are understandable to
your CPU. This step is called decoding.
3. Execute While executing instructions the CPU can do one of three things: Do
calculations with its ALU, move data from one memory location to another, or jump to a
different address.
4. Store The CPU must give feedback after executing an instruction and the output data is
written to the memory.
b) Monitor [5]
The main function of a computer monitor is to display video and graphical information
generated by the computers graphics adapter, allowing the user to interact with the
computer.
It is categorized as an output device.
Computer monitor is a display adapter that displays information processed by the
computer's video card.
When a video card or graphics card converts binary information from 1s and 0s into
images, these images are displayed onto the directly connected monitor.
Page 31 of 87
rmmakaha@gmail.com
There are different types of monitors, including cathode ray tube (CRT) and liquid crystal
displays (LCD).
Monitors have display functions that include powering it on and off, controlling
brightness, contrast and position, among others.
c) Keyboard [5]
d) Mouse [5]
A computer mouse enables its user to move a cursor smoothly and intuitively across a
two-dimensional plane.
It's therefore an essential input device for selecting, dragging, hovering, and clicking.
The mouse allows users to switch between applications, select options and buttons, and
move around the screen with a great degree of accuracy and fluidity.
It is used to move between and select links on a website, buttons on an options screen,
entries on a menu, and many more tasks that would be far more difficult using a keyboard
alone.
It is a device used for computer input. It points and click on icons, menus, command buttons or
activates something on a computer. The GUI (Graphical user interface) of current applications
and programs are user friendly and easier to navigate using computer mouse.
A computer mouse has many functions that help a user use their computer. Below are the most
common functions of a mouse.
Move the mouse cursor - The primary use of a computer mouse is to move the mouse
cursor on the screen.
Open or execute a program - Once you've moved the mouse to an icon, folder, or other
object clicking or double clicking that object opens the document or executes the
program.
Page 32 of 87
rmmakaha@gmail.com
Select - A mouse also allows you to select a file or highlight and select multiple files at
once.
Scroll - When working with a long document or viewing a long web page you may need
to scroll up or down on that page. Using a mouse wheel or clicking and dragging the
scroll bar is another function of the mouse.
e) CD-ROM [5]
Page 33 of 87
rmmakaha@gmail.com
QUESTION 5
Explain briefly the following
a) Systems software [5]
The system software is collection of programs designed to operate, control, and extend the
processing capabilities of the computer itself.
System software are generally prepared by computer manufactures.
These software products comprise of programs written in low-level languages which interact with
the hardware at a very basic level.
System software serves as the interface between hardware and the end users.
Some examples of system software are Operating System, Compilers, Interpreter, and Assemblers
etc.
Features of system software are as follows:
Close to system
Fast in speed
Difficult to design
Difficult to understand
Less interactive
Smaller in size
Difficult to manipulate
Generally written in low-level language
An operating system is a program that acts as an interface between the software and the computer
hardware.
It is an integrated set of specialized programs that are used to manage overall resources and
operations of the computer.
An operating system (OS) is the program that, after being initially loaded into the computer by a
boot program, manages all the other programs in a computer.
Examples include MSDOS, Windows, Android, Linux, Unix, Mac Os, IOS
Functions Of Operating Systems Include;
1. Controls and coordinates the computer system
2. Scheduling and loading of jobs to provide continuous processing. So that no parts of the
computer system are idle for any significant period of time.
3. It is a platform for application programs
4. Provides user interface
5. Acts as an interface between hardware and application programs
6. Provides error correctional routines
Page 34 of 87
rmmakaha@gmail.com
Control over selection and operation of input-output devices & file handling.
Records details of processing for control analysis
File management, control the creation, deletion, saving and access of files
Memory management, allocates memory to various jobs or tasks
Multiprogramming, multiprocessing, multitasking, timesharing, housekeeping & handling
errors.
Resource management manages processor time, memory space, disk space and peripheral
devices.
Reports errors when they occur.
Task management. Manage the accomplishment of the computing tasks of end users. It may
involve multitasking capability where several computing tasks can occur at the same time.
Minimizes the amount of human intervention required during processing.
d) RAM [5]
RAM (Random Access Memory) is the internal memory of the CPU for storing data, program
and program result.
It is read/write memory which stores data until the machine is working.
As soon as the machine is switched off, data is erased.
Access time in RAM is independent of the address that is, each storage location inside the
memory is as easy to reach as other locations and takes the same amount of time.
Data in the RAM can be accessed randomly but it is very expensive.
RAM is volatile, i.e. data stored in it is lost when we switch off the computer or if there is a
power failure.
Hence a backup uninterruptible power system (UPS) is often used with computers.
RAM is small, both in terms of its physical size and in the amount of data it can hold.
e) ROM [5]
ROM stands for Read Only Memory. The memory from which we can only read but
cannot write on it.
This type of memory is non-volatile.
The information is stored permanently in such memories during manufacture.
A ROM, stores such instructions that are required to start a computer.
This operation is referred to as bootstrap.
ROM chips are not only used in the computer but also in other electronic items like
washing machine and microwave oven
Page 36 of 87
rmmakaha@gmail.com
INPUT UNIT
o Any computer peripheral used to enter data and/or control signals into a computer
system. Some devices, such as modems, are capable of both input as well as output.
Examples of Input Devices
o
o
o
o
o
o
Digital Camerarecord photographs in the form of digital data that can be stored on a
computer.
Digitizerconverts points, lines, and curves from a sketch, drawing, or photograph to
digital impulses and transmits them to a computer
Electronic Whiteboardcaptures anything drawn on special whiteboard
Joystickuses the movement of a vertical stem to direct the pointer. These are often
used with computer games and have buttons you can press to activate events, depending
upon the software.
Graphics Tabletsimilar to a digitizer, but it also contains unique characters and
commands that can be generated automatically by the person using the tablet
Image Scanner (page scanner) an input device that can electronically capture an entire
page of text or images such as photographs or art work.
Page 37 of 87
rmmakaha@gmail.com
Page 38 of 87
rmmakaha@gmail.com
CD-ROM (compact disk read-only) a smaller optical disk that can store about
450 times the data on a floppy
Data Cartridgesremovable hard disk drives that provide both the storage
capacity and fast access
Floppy disk/drivea flexible platter coated with material that allows data to be
recorded magnetically on the surface of the platters.
Hard Diskone or more rigid platters coated with material that allows data to be
recorded magnetically on the surface of the platters.
Page 39 of 87
rmmakaha@gmail.com
Page 41 of 87
rmmakaha@gmail.com
QUESTION 2
a) Using practical examples explain the basic functions of an
operating system. [10]
1.
2.
3.
4.
Page 42 of 87
rmmakaha@gmail.com
5.
6.
7.
8.
The operating system is responsible for smooth execution of applications by allocating the
resources required for them to operate. This means an application that is not responding
correctly can be "killed".
MANAGEMENT OF AUTHORISATIONS:
The operating system is responsible for security relating to execution of programmes by
guaranteeing that the resources are used only by programs and users with the
relevantauthorizations.
FILE MANAGEMENT:
The operating system manages reading and writing in the file system and the user and
application file access authorizations.
The OS manages reading from and writing to files and also controls the creation,
manipulation and access to files.
The operating system is responsible for the following activities in connections with file
management:
File creation and deletion
Directory creation and deletion
Support of primitives for manipulating files and directories
Mapping files onto secondary storage
File backup on stable (nonvolatile) storage media
INFORMATION MANAGEMENT:
The operating system provides a certain number of indicators that can be used to diagnose
the correct operation of the machine.
ERROR DETECTION
The OS is responsible for detecting and any hardware or software malfunctioning and
reporting them to the user
9.
USER/SYSTEM INTERFACE
10.
The OS acts as an interface between the computer and the user, hiding all the complexities of
the computer from the user and making the computer more user friendly
PREPARATION OF A SYSTEM LOG
The OS compiles a report on the events that take place in a computer from the time a user
logs on to a computer, what he/she does up to the time he/she logs off
Page 43 of 87
rmmakaha@gmail.com
Page 44 of 87
rmmakaha@gmail.com
QUESTION 3
a) Discuss any two benefits which a named sports organization
can derive from using a database management system (DBMS)
[10]
1.
2.
3.
Data Sharing - A database allows the sharing of data under its control by any
number of application programs or users.
4.
Data Integrity - Data integrity means that the data contained in the database is both
accurate and consistent. Centralized control can also ensure that adequate checks are
incorporated in the DBMS to provide data integrity.
5.
6.
Data Independence - Data independence is the capacity to change the schema at one
level of a database system without having to change the schema at the next level. It is
usually considered from two points of view: physical data independence and logical data
independence. Physical data independence is the capacity to change the internal schema
without having to change conceptual schema. Logical data independence is the
capacity to change the conceptual schema without having to change external schemas
or application programs.
7.
8.
Backup and Recovery - These facilities are provided to recover databases from hardware
and/or software failures
Page 45 of 87
rmmakaha@gmail.com
ii.
Screen readers are software programs that allow blind or visually impaired users to read the text
that is displayed on the computer screen with a speech synthesizer or braille display.
A screen reader is the interface between the computer's operating system, its applications, and the
user.
The user sends commands by pressing different combinations of keys on the computer keyboard
or braille display to instruct the speech synthesizer what to say and to speak automatically when
changes occur on the computer screen.
Page 46 of 87
rmmakaha@gmail.com
A command can instruct the synthesizer to read or spell a word, read a line or full screen of text,
find a string of text on the screen, announce the location of the computer's cursor or focused item,
and so on.
In addition, it allows users to perform more advanced functions, such as locating text displayed
in a certain color, reading pre-designated parts of the screen on demand, reading highlighted text,
and identifying the active choice in a menu.
Users may also use the spell checker in a word processor or read the cells of a spreadsheet with a
screen reader.
Screen readers are currently available for use with personal computers running Linux, Windows,
and mac, IOS, Android, and more.
Screen readers are used mainly by people who do not have useful vision to read text on the
screen.
A screen reader can also be the product of choice for someone with vision that is useful for
travel, but not for reading. In the long run, learning to listen to speech output will prove more
productive for such individuals than struggling to read text while leaning close to the computer
screen.
iii.
On screen keyboard.[5]
Page 47 of 87
rmmakaha@gmail.com
iv.
Presentation application.[5]
A presentation program is a software package used to display information in the form of a slide
show.
Examples include Microsoft PowerPoint
It has three major functions: an editor that allows text to be inserted and formatted, a method for
inserting and manipulating graphic images, and a slide-show system to display the content
A presentation program is supposed to help both the speaker with an easier access to his
ideas and the participants with visual information which complements the talk.
There are many different types of presentations including professional (work-related),
education, entertainment, and for general communication.
Presentation programs can either supplement or replace the use of older visualaid
technology, such as pamphlets, handouts, chalkboards, flip charts, posters, slides and
overhead transparencies.
Text, graphics, movies, and other objects are positioned on individual pages or "slides" or
"foils".
Slides can be printed, or (more usually) displayed on-screen and navigated through at the
command of the presenter.
Page 48 of 87
rmmakaha@gmail.com
QUESTION 4
Analyze the factors that affect the performance of a computer. [25]
The speed of the CPU is also known as the clock speed of the CPU. The clock speed of the CPU is the
frequency of which the processor executes instructions or the frequency by which data is processed by the
CPU. It is measured in millions of cycles per second or megahertz (MHz). If the Clock speed of the CPU
is fast then definitely the performance of the computer will be affected positively, in other words the
computer will carry out processing functions at a faster pace.
The CPU.
High performance, compatibility and upgradability are features that are important. The higher the
generation, the better. For example, because of high performance new features, Pentium 75 (fifth
generation with the clock rate 75 MHz) will outperform 80486DX100 (which is the fourth generation
CPU with the clock rate 100MHz).
Another important feature is word size measured in bits. 80386 and 80486 processors are 32 bit whereas
Pentiums are 64 bit processors, thus Pentiums can transfer twice as much data at a time compared to third
and fourth generation CPUs.
7) DEFRAGMENTING FILES
Files that are broken or it takes long to read them will mean that the computer will have to defragment
them first. This will slow down the performance of the computer.
8). DATA BUS TYPE AND SIZE.
The data bus is the highway that carries information between the processor and the memory subsystem.
The wider the data bus, the more information it can transfer. Because of its external 64-bit data bus, the
Pentium processor can transfer data to and from memory at rates up to 528 Mbytes/second (five times
faster than the transfer rate of the Intel486 (TM) DX2-66MHz microprocessor).
The PCI local bus greatly improves I/O performance. It can transfer data between the processor and the
peripherals at up to 132 MB/second, far faster than the ISA bus rate of 5 MB/second
9). CLOCK RATE.
Since any step of processing can happen only on the "tick" of the clock (called clock cycle), the faster the
rate the quicker the CPU works. The Intel486(TM) processor, for example, is able to execute many of its
instructions in one clock cycle, while previous generations of Intel microprocessors require multiple clock
cycles to execute a single instruction. The Pentium processors have the ability to execute multiple
instructions per clock cycle due to the fact that the Pentium processor's two pipelines can execute two
instructions simultaneously. If other modules of the system require more than one clock pulse, the CPU
has to wait for them to keep up. This is called a wait state.
In a recent industry magazine test of notebook computers, a 486 machine with L2 cache outperformed a
Pentium 90 machine without L2 cache by 30%.
.
11. CD-ROM drive speed.
At the time of writing of these notes the slowest CD-ROM drive available on the market is quad speed. It
may be enough, if you are not running applications from CD-ROM, but only installing them. Otherwise
look at octal or ten-speed technologies.
12. MMX processors.
Multimedia extensions processors (MMX) is designed specifically to support media-rich software and
communications applications.. The Pentium processor with MMX technology will give a better, smoother
and more realistic multimedia experience. These processors have got 57 powerful new instructions
specifically designed to manipulate and process video, audio and graphical data efficiently. However,
your system will require software designed for MMX technology (old software must be recompiled to
take advantage of new MMX features).
Page 52 of 87
rmmakaha@gmail.com
QUESTION 5
a) Critically analyze the reasons why some organizations and
individuals insist on using old software. [10]
Funding challenges
New equipment cost
Training cost
New software cost
New skills cost
Training cost
Dependency syndrome
Page 53 of 87
rmmakaha@gmail.com
The role of application software is to perform specific operations for various applications.
Solve specific user problems e.g. calculations and graphs are done using spreadsheets
Communication problems are solved using applications such WhatsApp, email apps
These roles include writing reports, creating spreadsheets, manipulating images, keeping records,
developing websites and calculating expenses.
Examples of application software include Spreadsheets, Word processors and desktop publishing
applications
Depending on the specific application software being used, the role of the software varies from
manipulating text, images, numbers and graphics to creating presentations and personal websites.
Some application software packages concentrate on a single, specific task, such as word
processing and presentation creation.
There are also application packages that focus on multiple tasks, such as database software and
web design.
Page 54 of 87
rmmakaha@gmail.com
NOV 2014
QUESTION 1
Describe the following computer packages and their advantages in
sport
a) Microsoft Word [6]
d) Database [7]
Page 56 of 87
rmmakaha@gmail.com
QUESTION 2
a) Outline the differences between internet and intranet. [12]
INTERNET
INTRANET
It is regulated by an organization.
It is owned by no one.
Page 57 of 87
rmmakaha@gmail.com
Page 58 of 87
rmmakaha@gmail.com
One cannot imagine an online life without Facebook or Twitter. Social networking has become so popular
amongst youth that it might one day replace physical networking. It has evolved as a great medium to
connect with millions of people with similar interests. Apart from finding long-lost friends, you can also
look for job, business opportunities on forums, communities etc. Besides, there are chat rooms where
users can meet new and interesting people. Some of them may even end up finding their life partners.
Online Services
The Internet has made life very convenient. With numerous online services you can now perform all your
transactions online. You can book tickets for a movie, transfer funds, pay utility bills, taxes etc., right
from your home. Some travel websites even plan an Itinerary as per your preferences and take care of
airline tickets, hotel reservations etc.
e-commerce
The concept of e-commerce is used for any type of commercial maneuvering or business deals that
involves the transfer of information across the globe via the Internet. It has become a phenomenon
associated with any kind of shopping, business deal etc. You name a service, and e-commerce with its
giant tentacles engulfing every single product and service will make it available at your doorstep.
Websites such as eBay allow you to even bid for homes, buy, sell or auction stuff online.
Disadvantages
Theft of Personal Information
If you use the Internet for online banking, social networking or other services, you may risk a theft to
your personal information such as name, address, credit card number etc. Unscrupulous people can access
this information through unsecured connections or by planting software and then use your personal details
for their benefit. Needless to say, this may land you in serious trouble.
Spamming
Spamming refers to sending unwanted e-mails in bulk, which provide no purpose and needlessly obstruct
the entire system. Such illegal activities can be very frustrating for you as it makes your Internet slower
and less reliable.
Virus Threat
Internet users are often plagued by virus attacks on their systems. Virus programs are inconspicuous and
may get activated if you click a seemingly harmless link. Computers connected to the Internet are very
prone to targeted virus attacks and may end up crashing.
Pornography
Pornography is perhaps the biggest disadvantage of the Internet. Internet allows you to access and
download millions of pornographic photos, videos and other X-rated stuff. Such unrestricted access to
porn can be detrimental for children and teenagers. It can even play a havoc in marital and social lives of
adults.
Social Disconnect
Thanks to the Internet, people now only meet on social networks. More and more people are getting
engulfed in virtual world and drifting apart from their friends and family. Even children prefer to play
online games rather than going out and mingling with other kids. This may hamper a healthy social
development in children
Page 59 of 87
rmmakaha@gmail.com
QUESTION 3
a) Give your understanding of computer networking. [12]
A computer network is a collection of computers and other hardware components
interconnected by communication channels that allow sharing of resources and
information
Where at least one process in one device is able to send/receive data to/from at least one
process residing in a remote device, then the two devices are said to be in a network.
Simply, more than one computer interconnected through a communication medium for
information interchange is called a computer network.
Networks may be classified according to a wide variety of characteristics, such as the
medium used to transport the data, communications protocol used, scale, topology, and
organizational scope.
Communications protocols define the rules and data formats for exchanging information
in a computer network, and provide the basis for network programming.
Well-known communications protocols include Ethernet, a hardware and link layer
standard that is ubiquitous in local area networks, and the Internet protocol suite, which
defines a set of protocols for internetworking, i.e. for data communication between
multiple networks, as well as host-to-host data transfer, and application-specific data
transmission formats.
ADVANTAGES OF INSTALLING A NETWORK
1. Speed. Networks provide a very rapid method for sharing and transferring files. Without
a network, copying them to floppy disks, then carrying or sending the disks from one
computer to another shares files. This method of transferring files (referred to as sneakernet) is very time-consuming.
2. Cost. Networkable versions of many popular software programs are available at
considerable savings when compared to buying individually licensed copies. Besides
monetary savings, sharing a program on a network allows for easier upgrading of the
program. The changes have to be done only once, on the file server, instead of on all the
individual workstations. Low cost. Single device shared by several machines reduce the
need to buy many peripheral devices. Resource sharing also serves money. An
installation can have several low-cost work stations accessing a single file-server. That
puts a lot of processing power on the users desk without the expense of large mainframe
systems.
3. Security. Files and programs on a network can be designated as "copy inhibit," so that
you do not have to worry about illegal copying of programs. Also, passwords can be
established for specific directories to restrict access to authorized users. Security is good
- users cannot see other users' files unlike on stand-alone machines.
4. Centralized Software Management. One of the greatest benefits of installing a network
at a school is the fact that all of the software can be loaded on one computer (the file
Page 60 of 87
rmmakaha@gmail.com
Page 62 of 87
rmmakaha@gmail.com
MESH TOPOLOGY
STAR TOPOLOGY
Page 63 of 87
rmmakaha@gmail.com
Describes a network in which each node is connected to a common line.
This is also sometimes called a horizontal, multidrop or multi point network.
Though it is preferable to use the last terms for connections with a mainframe/mini
computer as in the following diagram.
In a bus messages travel in both directions and do not go through the individual nodes but
every node can hear each message as it goes past.
When the signal/message reaches an end of the bus, a terminator absorbs it, to keep it
from traveling back again along the bus line, to avoid interference with other messages
already in the line.
The data/signals/messages are transmitted in packets along the bus.
Page 64 of 87
rmmakaha@gmail.com
RING NETWORK
Page 65 of 87
rmmakaha@gmail.com
TREE TOPOLOGY
Page 67 of 87
rmmakaha@gmail.com
QUESTION 4
Examine the following computer memories
a) ROM [5]
ROM stands for Read Only Memory. The memory from which we can only read but
cannot write on it.
This type of memory is non-volatile.
The information is stored permanently in such memories during manufacture.
A ROM, stores such instructions that are required to start a computer.
This operation is referred to as bootstrap.
ROM chips are not only used in the computer but also in other electronic items like
washing machine and microwave oven
b) RAM [5]
RAM (Random Access Memory) is the internal memory of the CPU for storing data, program
and program result.
It is read/write memory which stores data until the machine is working.
As soon as the machine is switched off, data is erased.
Access time in RAM is independent of the address that is, each storage location inside the
memory is as easy to reach as other locations and takes the same amount of time.
Data in the RAM can be accessed randomly but it is very expensive.
RAM is volatile, i.e. data stored in it is lost when we switch off the computer or if there is a
power failure.
Hence a backup uninterruptible power system (UPS) is often used with computers.
RAM is small, both in terms of its physical size and in the amount of data it can hold.
Page 68 of 87
rmmakaha@gmail.com
c) EPROM [5]
d) PROM [5]
e) EAPROM [5]
Page 69 of 87
rmmakaha@gmail.com
QUESTION 5
Discuss any four types of computer generations giving relevant
examples. [25]
First Generation of Computers (1942-1955)
The first computers used vacuum tubes for circuitry and magnetic drums for memory, and were
often enormous, taking up entire rooms.
These were inefficient materials which generated a lot of heat, sucked huge electricity and
subsequently generated a lot of heat which caused ongoing breakdowns.
They were very expensive to operate and in addition to using a great deal of electricity, the first
computers generated a lot of heat, which was often the cause of malfunctions.
First generation computers relied on machine language, the lowest-level programming language
understood by computers, to perform operations, and they could only solve one problem at a time,
and it could take days or weeks to set-up a new problem.
Input was based on punched cards and paper tape, and output was displayed on printouts.
The UNIVAC and ENIAC computers are examples of first-generation computing devices. The
UNIVAC was the first commercial computer delivered to a business client, the U.S. Census
Bureau in 1951.
Advantages
Vacuum tubes were the only electronic component available during those days.
Vacuum tube technology made possible to make electronic digital computers.
These computers could calculate data in millisecond.
Disadvantages
Page 70 of 87
rmmakaha@gmail.com
Transistors replace vacuum tubes and ushered in the second generation of computers.
The transistor was invented in 1947 but did not see widespread use in computers until the late
1950s.
The transistor was far superior to the vacuum tube, allowing computers to become smaller, faster,
cheaper, more energy-efficient and more reliable than their first-generation predecessors.
Though the transistor still generated a great deal of heat that subjected the computer to damage, it
was a vast improvement over the vacuum tube.
Second-generation computers still relied on punched cards for input and printouts for output.
Second-generation computers moved from cryptic binary machine language to symbolic, or
assembly, languages, which allowed programmers to specify instructions in words.
High-level programming languages were also being developed at this time, such as early versions
of COBOL and FORTRAN.
These were also the first computers that stored their instructions in their memory, which moved
from a magnetic drum to magnetic core technology.
The first computers of this generation were developed for the atomic energy industry.
Advantages
Disadvantages
The development of the integrated circuit was the hallmark of the third generation of computers.
Transistors were miniaturized and placed on silicon chips, called semiconductors, which
drastically increased the speed and efficiency of computers.
Instead of punched cards and printouts, users interacted with third generation computers through
keyboards and monitors and interfaced with an operating system, which allowed the device to run
many different applications at one time with a central program that monitored the memory.
Page 71 of 87
rmmakaha@gmail.com
Computers for the first time became accessible to a mass audience because they were smaller and
cheaper than their predecessors.
Advantages
Disadvantages
Advantages
Disadvantages
Scientists are working hard on the 5th generation computers with quite a few breakthroughs.
It is based on the technique of Artificial Intelligence (AI).
Computers can understand spoken words & imitate human reasoning.
Can respond to its surroundings using different types of sensors.
Scientists are constantly working to increase the processing power of computers.
They are trying to create a computer with real IQ with the help of advanced programming and
technologies.
IBM Watson computers one example that outsmarts Harvard University Students.
The advancement in modern technologies will revolutionize the computer in future.
Fifth generation computing devices, based on artificial intelligence, are still in development,
though there are some applications, such as voice recognition, that are being used today.
The use of parallel processing and superconductors is helping to make artificial intelligence a
reality.
Quantum computation and molecular and nanotechnology will radically change the face of
computers in years to come.
The goal of fifth-generation computing is to develop devices that respond to natural language
input and are capable of learning and self-organization.
Page 73 of 87
rmmakaha@gmail.com
NOV 2015
QUESTION 1
Examine the following hand held portable devices.
PDA (personal digital assistant) is a term for any small mobile hand-held device that
provides computing and information storage and retrieval capabilities for personal or
business use, often for keeping schedule calendars and address book information handy.
The term handheld is a synonym. Many people use the name of one of the popular PDA
products as a generic term. These include Hewlett-Packard's Palmtop and 3Com's
PalmPilot.
A personal digital assistant (PDA), also known as a handheld PC, or personal data
assistant, is a mobile device that functions as a personal information manager.
The term evolved from Personal Desktop Assistant, a software term for an application
that prompts or prods the user of a computer with suggestions or provides quick reference
to contacts and other lists.
PDAs were largely discontinued in the early 2010s after the widespread adoption of
highly capable smartphones, in particular those based on iOS and Android.
Nearly all PDAs have the ability to connect to the Internet.
A PDA has an electronic visual display, enabling it to include a web browser, all models
also have audio capabilities enabling use as a portable media player, and also enabling
most of them to be used as mobile phones.
Most PDAs can access the Internet, intranets or extranets via Wi-Fi or Wireless Wide
Area Networks. Most PDAs employ touchscreen technology.
A typical PDA has a touchscreen for entering data, a memory card slot for data storage, and
IrDA, Bluetooth and/or Wi-Fi. However, some PDAs may not have a touchscreen, using softkeys,
a directional pad, and a numeric keypad or a thumb keyboard for input; this is typically seen on
telephones that are also PDAs.
To have the functions expected of a PDA, a device's software typically includes an appointment
calendar, a to-do list, an address book for contacts, a calculator, and some sort of memo (or
"note") program.
PDAs with wireless data connections also typically include an email client and a Web browser.
Page 74 of 87
rmmakaha@gmail.com
A portable media player (PMP) or digital audio player (DAP) is a portable consumer
electronics device capable of storing and playing digital media such as audio, images, and
video files.
The data is typically stored on a CD, DVD, flash memory, microdrive, or hard drive.
Most portable media players are equipped with a 3.5 mm headphone jack, which users
can plug headphones into, or connect to a boom box or hifi system.
In contrast, analog portable audio players play music from non-digital media that use
analog signal storage, such as cassette tapes or vinyl records.
Often mobile digital audio players are marketed and sold as "portable MP3 players", even
if they also support other file formats and media types.
Increasing sales of smartphones and tablet computers have led to a decline in sales of
portable media players, leading to some devices being phased out, though flagship
devices like the Apple iPod and Sony Walkman are still in production.
Portable DVD players are still manufactured by brands across the world.
PMPs are capable of playing digital audio, images, and/or video.
Usually, a color liquid crystal display (LCD) or organic light-emitting diode (OLED) screen is
used as a display for PMPs that have a screen.
Various players include the ability to record video, usually with the aid of optional accessories or
cables, and audio, with a built-in microphone or from a line out cable or FM tuner.
Some players include readers for memory cards, which are advertised to equip players with extra
storage or transferring media.
In some players, features of a personal organizer are emulated, or support for video games, like
the iriver clix (through compatibility of Adobe Flash Lite) or the PlayStation Portable, is
included.
Only mid-range to high-end players support "savestating" for power-off (i.e. leaves off
song/video in progress similar to tape-based media).
A smartphone is a cellular telephone with an integrated computer and other features not originally
associated with telephones, such as an operating system, Web browsing and the ability to run
software applications.
A smartphone is a mobile phone with an advanced mobile operating system which combines
features of a personal computer operating system with other features useful for mobile or
handheld use.
Smartphones, which are usually pocket-sized, typically combine the features of a cell phone, such
as the abilities to place and receive voice calls and create and receive text messages, with those of
Page 75 of 87
rmmakaha@gmail.com
other popular digital mobile devices like personal digital assistants (PDAs), such as an event
calendar, media player, video games, GPS navigation, digital camera and digital video camera.
Most smartphones can access the Internet and can run a variety of third-party software
components ("apps").
They typically have a color display with a graphical user interface that covers 70% or more of the
front surface.
The display is often a touchscreen, which enables the user to use a virtual key board to type
words and numbers and press onscreen icons to activate "app" features.
Texting
Digital cameras, typically with video capability
Gaming
Unified messaging
Personal information management
GPS (global positioning system)
Remote control of computers
Remote control of home or business electronic systems
Consumer smartphones evolved out of personal digital assistants (PDAs), rather than cell phones
around the turn of the 21st century, when devices such as the PalmPilot began to
include wireless connectivity
Page 76 of 87
rmmakaha@gmail.com
QUESTION 2
Discuss the following computer output devices
a) Projection devices [5]
A digital projector is a device which connects to a computer and is used to project the
video output from the computer onto a wall or screen.
A projector is an output device that can take images generated by a computer and
reproduce them on a large, flat (usually lightly colored) surface. For example, projectors
are used in meetings to help ensure that all participants can view the information being
presented. The picture is that of a View Sonic projector.
In classrooms they are often used with electronic whiteboards.
The projector can be portable and placed on a stand or it can be permanently fixed to the
Uses of digital projectors:
Classroom teaching
Staff training sessions
A presentation to an audience
Home cinemas
Although most digital projectors are fairly large in size, new technology is currently being
developed to incorporate digital projection into small hand-held devices.
Page 77 of 87
rmmakaha@gmail.com
Suitable uses:
Disadvantages:
Advantages:
A type of printer that utilizes a laser beam to produce an image on a drum. The light of the laser
alters the electrical charge on the drum wherever it hits. The drum is then rolled through a
reservoir of toner, which is picked up by the charged portions of the drum. Finally, the toner is
transferred to the paper through a combination of heat and pressure
Page 79 of 87
rmmakaha@gmail.com
QUESTION 3
Using practical examples distinguish between operating system and
application programs. [25]
The Operating System is the System Software that makes the Computer work.
We can say that an Operating System (OS) is Software that acts as an interface between
you and the hardware.
It not only contains drivers used to speak the hardware's language, but also offers you a
very specific graphical user interface (GUI) to control the computer.
An OS can also act as an interface (from the hardware) to the other software.
A complex OS like Windows or Linux or Mac OS offers the services of an OS, but also
has applications built in. Solitaire, Paint, Messenger, etc. are all applications.
Application software is the software that you install onto your Operating System.
It consists of the programs that actually let you do things with your computer.
These Applications are written to run under the various Operating Systems.
These include things like your word processing programs, spread sheets, email clients,
web browser, games, etc. Many programs, such as most of the Microsoft Office suite of
programs, are written in both Mac and Windows versions, but you still have to have the
right version for your OS.
So, the operating system of a computer is the software that allows the computer work.
It provides the framework under which the applications run.
The Operating system of a Computer is the Software that allows the Computer work.
It provides the framework under which the Applications run.
An operating system is the type of Computer system you have such as Window XP or
Window 95, 98, Mac, etc.
The applications are the software that actually allows the user to do something with the
computer.
Without the applications, all you can do is change settings and navigate among the
folders.
The Applications are the Software that actually allows the user to do something with the
Computer.
Without the applications, all you can do is change settings and navigate among the
folders. You can purchase its CD from a software company or download from a software
company's web site.
The operating system is used to manage system resources and give application software
an environment in which it can run.
It acts as an intermediary between the user, the software and the computer hardware.
Page 80 of 87
rmmakaha@gmail.com
When the computer is turned on, the primary parts of the operating system are loaded into
memory and stay there while the PC is turned on.
While booting up, it configures the hardware and makes sure everything is connected and
then runs many software tasks in order to get the operating system working in a way that
a user can interact with it.
Application software is the front-end software that users handle.
Common applications, such as Microsoft Office, Google Chrome and Skype are
generally installed by the user and are required to undertake particular tasks.
Application software, such as antivirus programs, will usually start when the PC is turned
on and run in the background after the operating system has loaded all of the necessary
services and programs.
System Software
Application Software
Close to system
Difficult to design
Less interactive
Fast in speed
Generally written in low-level language.
Difficult to understand
Difficult to manipulate
Smaller in size
Close to user
Easy to design
More interactive
Slow in speed
Generally written in high-level lang.
Easy to understand
Easy to manipulate and use
Bigger in size and requires large storage
space
Page 81 of 87
rmmakaha@gmail.com
QUESTION 4
Describe any 5 factors that can affect the performance of a PC [25]
1) THE SPEED OF THE CPU
The speed of the CPU is also known as the clock speed of the CPU. The clock speed of the CPU is the
frequency of which the processor executes instructions or the frequency by which data is processed by the
CPU. It is measured in millions of cycles per second or megahertz (MHz). If the Clock speed of the CPU
is fast then definitely the performance of the computer will be affected positively, in other words the
computer will carry out processing functions at a faster pace.
The CPU.
High performance, compatibility and upgradability are features that are important. The higher the
generation, the better. For example, because of high performance new features, Pentium 75 (fifth
generation with the clock rate 75 MHz) will outperform 80486DX100 (which is the fourth generation
CPU with the clock rate 100MHz).
Another important feature is word size measured in bits. 80386 and 80486 processors are 32 bit whereas
Pentiums are 64 bit processors, thus Pentiums can transfer twice as much data at a time compared to third
and fourth generation CPUs.
7) DEFRAGMENTING FILES
Files that are broken or it takes long to read them will mean that the computer will have to defragment
them first. This will slow down the performance of the computer.
8). DATA BUS TYPE AND SIZE.
The data bus is the highway that carries information between the processor and the memory subsystem.
The wider the data bus, the more information it can transfer. Because of its external 64-bit data bus, the
Pentium processor can transfer data to and from memory at rates up to 528 Mbytes/second (five times
faster than the transfer rate of the Intel486 (TM) DX2-66MHz microprocessor).
The PCI local bus greatly improves I/O performance. It can transfer data between the processor and the
peripherals at up to 132 MB/second, far faster than the ISA bus rate of 5 MB/second
9). CLOCK RATE.
Since any step of processing can happen only on the "tick" of the clock (called clock cycle), the faster the
rate the quicker the CPU works. The Intel486(TM) processor, for example, is able to execute many of its
instructions in one clock cycle, while previous generations of Intel microprocessors require multiple clock
cycles to execute a single instruction. The Pentium processors have the ability to execute multiple
instructions per clock cycle due to the fact that the Pentium processor's two pipelines can execute two
instructions simultaneously. If other modules of the system require more than one clock pulse, the CPU
has to wait for them to keep up. This is called a wait state.
In a recent industry magazine test of notebook computers, a 486 machine with L2 cache outperformed a
Pentium 90 machine without L2 cache by 30%.
.
11. CD-ROM drive speed.
At the time of writing of these notes the slowest CD-ROM drive available on the market is quad speed. It
may be enough, if you are not running applications from CD-ROM, but only installing them. Otherwise
look at octal or ten-speed technologies.
12. MMX processors.
Multimedia extensions processors (MMX) is designed specifically to support media-rich software and
communications applications.. The Pentium processor with MMX technology will give a better, smoother
and more realistic multimedia experience. These processors have got 57 powerful new instructions
specifically designed to manipulate and process video, audio and graphical data efficiently. However,
your system will require software designed for MMX technology (old software must be recompiled to
take advantage of new MMX features).
Page 85 of 87
rmmakaha@gmail.com
QUESTION 5
Distinguish between Broadband and Dial up internet connection
[25]
The fundamental difference between dialup and broadband Internet connections is the manner
in which the connection is made from your PC to the Internet.
A dialup service connects to the Internet through your phone line.
The modem in your PC "calls" an Internet Service Provider (ISP) and connects with a maximum
speed of 56,000 bytes per second, better known as a 56K speed connection.
Each time your PC dials into the ISP, it is assigned an Internet Protocol (IP) address, which you
can think of as an "Internet address."
A different, unique IP address is assigned at the beginning of each visit so that the ISP can
recognize your PC and make sure you can send and receive email, surf the Internet, and so on;
basically, this address lets your ISP know where to send the information you are requesting
through your modem.
In terms of hackers, in order for someone to gain access to your computer, it would be necessary
for them to know your IP to successfully do so. The fact that your IP address constantly changes
essentially makes your Internet connection more secure.
In contrast, when you connect to the Internet via a broadband Internet connection, the process is
slightly different.
Once your PC is connected to the ISP through a cable or DSL connection, it remains connected
until the cable box or DSL line is disconnected or physically unplugged.
A DSL connection runs through unused wires in your existing phone line without disruption and
can translate data at 5 million bytes per second, or 5Mbps.
Broadband services are often referred to as "always on" services because it is not necessary to
make a setup call to your ISP each time you wish to access the Internet; this means that once you
are assigned an IP address, you keep it until you request it to be changed. We'll learn how to do
this in a later newsletter.
Connection speed and price are two important considerations when choosing between dialup and
broadband.
Dialup connection speeds make it more difficult to view certain types of media, such as video,
and it can take much longer to download and open email attachments, play online games, and so
on.
Although the slower connection speed is a disadvantage for dialup users, there are also a few
advantages to using this type of connection, which include lower monthly charges and a higher
level of security.
The cost difference is obvious when comparing the $20-30 per month subscription fee for dialup
and the $50-60 per month subscription fee for most broadband services.
In terms of security, because the connection is not "always on" and because you are assigned a
different IP address each time, it is slightly more difficult to be attacked over the Internet,
although nothing is ever fool proof and risks still do exist.
The advantages of a broadband connection can sometimes outweigh some of the disadvantages.
The increased connection speed allows for ease in initial connection, duration of connection, no
Page 86 of 87
rmmakaha@gmail.com
Dial-up
A dial-up connection allows users to connect to the internet via their telephone line using
a standard 56k modem.
The computer literally dials a telephone number provided by the Internet Service
Provider and connects to the server's modem and therefore the Internet.
Dial-up has a transfer rate of 56 Kilobits of data per second under ideal conditions.
The distinctive chatter of a dial-up is rapidly becoming a sound of the past as broadband
sweeps the global network. In fact, only 3 percent Internet users still use dial up. It's no
mystery why when you consider the enormous benefits:
Save Time: Broadband operates from 10 to 20 times faster than a dial-up connection,
enabling the speedy transfer of large amounts of data. For instance, downloading a song
takes a few seconds versus perhaps 10 minutes with dial-up; e-mailing digital photos is
almost instantaneous.
Save Money: If you now dedicate a second phone line for Internet access, you can cancel
it. Also, broadband subscribers usually pay a flat monthly fee, avoiding hourly usage
charges. In the long run, it may actually cost you less for broadband than for a dial-up
account.
Convenience: With broadband you have instant Internet access, 24/7, so you don't have
to connect each time you want to go online--you're always connected. This makes it easy
to access information when you need it, check your e-mail, and even make phone calls
over the Internet. Also, multiple computers can share a broadband connection, a great
feature if members of your family want to be online at the same time.
New Services: Once you have high-speed Internet access, a new world of possibilities
opens to you, such as videoconferencing and photo sharing. You can also listen to online
radio and watch streaming video, as well as download music, film clips and movies.
Page 87 of 87
rmmakaha@gmail.com